Which of the following is the BEST approach for selecting controls to minimize risk?
Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
Which of the following BEST assists in justifying an investment in automated controls?
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
Which of the following should be an element of the risk appetite of an organization?
Which of the following is MOST important for an organization to consider when developing its IT strategy?
An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?
A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?
Who should have the authority to approve an exception to a control?
Which of the following is the PRIMARY accountability for a control owner?
Key risk indicators (KRIs) BEST support risk treatment when they:
Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
How does the identification of risk scenarios contribute to effective IT risk management?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?
Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?
A risk practitioner has reviewed new international regulations and realizes the new regulations will affect the organization. Which of the following should be the risk practitioner's NEXT course of
action?
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
An IT risk threat analysis is BEST used to establish
A business is conducting a proof of concept on a vendor's Al technology. Which of the following is the MOST important consideration for managing risk?
An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?
After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?
Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?
Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
The PRIMARY focus of an ongoing risk awareness program should be to:
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?
Which of the following roles would provide the MOST important input when identifying IT risk scenarios?
Which of the following is the MOST effective key performance indicator (KPI) for change management?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?
Which of the following attributes of a key risk indicator (KRI) is MOST important?
An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'
Who is ULTIMATELY accountable for risk treatment?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?
After identifying new risk events during a project, the project manager s NEXT step should be to:
An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?
Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?