Within the three lines of defense model, the responsibility for managing risk and controls resides with:
A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider who should the risk scenario be reassigned to.
The PRIMARY benefit associated with key risk indicators (KRls) is that they:
Which of the following BEST enables effective IT control implementation?
Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?
An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?
The MOST essential content to include in an IT risk awareness program is how to:
Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?
An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
An organization mandates the escalation of a service ticket when a key application is offline for 5 minutes or more due to potential risk exposure. The risk practitioner has been asked by management to prepare a report of application offline times using both 3- and 5-minute thresholds. What does the 3-minute threshold represent?
What is the BEST information to present to business control owners when justifying costs related to controls?
Which of the following would be MOST helpful when estimating the likelihood of negative events?
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
An organization has established workflows in its service desk to support employee reports of security-related concerns. Which of the following is the MOST efficient approach to analyze these concerns?
A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?
Which of the following is a drawback in the use of quantitative risk analysis?
When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?
Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?
A migration from an in-house developed system to an external cloud-based solution is affecting a previously rated key risk scenario related to payroll processing. Which part of the risk register should be updated FIRST?
Which of the following is the PRIMARY risk management responsibility of the third line of defense?
An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
Which of the following will BEST support management repotting on risk?
An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?
When creating a program to manage data privacy risk, which of the following is MOST important to ensure that the program is successful?
A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
What should be the PRIMARY objective of updating a risk awareness program in response to a steady rise in cybersecurity threats across the industry?
Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:
Which of the following is the GREATEST risk associated with inappropriate classification of data?
In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?
Which of the following would BEST facilitate the implementation of data classification requirements?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Risk acceptance of an exception to a security control would MOST likely be justified when:
When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:
When of the following provides the MOST tenable evidence that a business process control is effective?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Which of the following is the MOST reliable validation of a new control?
Which of the following BEST enables detection of ethical violations committed by employees?
Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?