Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?
Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?
An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?
Which of the following provides the BEST evidence that risk responses are effective?
An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?
A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?
Which of the following is the PRIMARY benefit of using a risk map with stakeholders?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Effective risk communication BEST benefits an organization by:
Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?
Which of the following is the MOST important reason to communicate control effectiveness to senior management?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
Winch of the following is the BEST evidence of an effective risk treatment plan?
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
Which of the following scenarios is MOST important to communicate to senior management?
Which of the following would MOST likely require a risk practitioner to update the risk register?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?
Which of the following is MOST helpful in preventing risk events from materializing?
When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:
During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?
Which of the following is the MOST important input when developing risk scenarios?
Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Upon learning that the number of failed backup attempts continually exceeds
the current risk threshold, the risk practitioner should:
Which of the following is the BEST way to support communication of emerging risk?
Which of the following is MOST helpful in reducing the likelihood of inaccurate risk assessment results?
Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
To enable effective integration of IT risk scenarios and ERM, it is MOST important to have a consistent approach to reporting:
Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?
The PRIMARY purpose of vulnerability assessments is to:
Who should have the authority to approve an exception to a control?
Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
Which of the following should be the PRIMARY basis for prioritizing risk responses?
An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
Which of the following should be management's PRIMARY consideration when approving risk response action plans?
Which of the following is MOST important when developing key performance indicators (KPIs)?
Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
Which of the following should be the PRIMARY area of focus when reporting changes to an organization's risk profile to executive management?
Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?