Avoiding a business activity removes the need to determine:
Who should have the authority to approve an exception to a control?
Who should be accountable for authorizing information system access to internal users?
Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following deficiencies identified during a review of an organization ' s cybersecurity policy should be of MOST concern?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
Which of the following is the MOST critical factor to consider when determining an organization ' s risk appetite?
Which of the following roles would provide the MOST important input when identifying IT risk scenarios?
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
An organization ' s risk tolerance should be defined and approved by which of the following?
Which of the following is the PRIMARY role of the first line of defense with respect to information security policies?
The PRIMARY objective of a risk identification process is to:
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
Which of the following is the BEST indication of an enhanced risk-aware culture?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
An organization control environment is MOST effective when:
An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
Which of the following would qualify as a key performance indicator (KPI)?
Which of the following is the GREATEST impact of implementing a risk mitigation strategy?
Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
Which of the following is the MAIN reason to continuously monitor IT-related risk?
A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following is the BEST indicator of the effectiveness of a control action plan ' s implementation?
Which of the following is the BEST time for an enterprise project management team to use risk analysis?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
A risk practitioner is evaluating policies defined by an organization as part of its IT security framework. Which of the following would be of GREATEST concern?
Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?
Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?
Which of the following will provide the BEST measure of compliance with IT policies?
An automobile manufacturer is considering implementing an Internet of Things (IoT) network to improve customer service by collecting customer and vehicle data. Which of the following would be the risk practitioner’s BEST recommendation?
After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?
Which of the following is the BEST key performance indicator (KPI) for a server patch management process?
Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application?
What is the MOST effective approach to promote ethical decision-making in a global organization?
Which of the following would BEST indicate to senior management that IT processes are improving?
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor ' s control environment?
Which of the following provides the BEST assurance of…..
Which of the following BEST indicates that additional or improved controls ate needed m the environment?
A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?
Which of the following is a risk practitioner ' s BEST recommendation to senior management when the cost to mitigate a risk scenario exceeds the financial impact should the risk materialize?