Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?
Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?
Which of the following is the BEST method to track asset inventory?
Which of the following is MOST important to promoting a risk-aware culture?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?
The FIRST task when developing a business continuity plan should be to:
Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?
During a data loss incident, which role in the RACI chart would be aligned to the risk practitioner?
Which types of controls are BEST used to minimize the risk associated with a vulnerability?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
Which of the following activities is PRIMARILY the responsibility of senior management?
Which of the following BEST enables the recovery of data that has been encrypted by a ransomware attack?
An IT license audit has revealed that there are several unlicensed copies of co be to:
Which of the following is MOST helpful in providing an overview of an organization ' s risk management program?
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner ' s BEST course of action?
The PRIMARY benefit associated with key risk indicators (KRls) is that they:
Which of the following contributes MOST to the effective implementation of risk responses?
Which of the following functions independently reviews and provides feedback regarding the achievement of organizational objectives?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
Which of the following BEST indicates the effectiveness of anti-malware software?
Which of the following BEST reduces the probability of laptop theft?
Which of the following would be MOST effective in monitoring changes in an organization ' s IT risk environment?
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?
An organization plans to implement a new AI application, but the risk practitioner learns that IT policies do not address AI. Which of the following would be the risk practitioner ' s GREATEST concern?
Which of the following should be an element of the risk appetite of an organization?
The BEST indication that risk management is effective is when risk has been reduced to meet:
To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization ' s data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?
Which of the following should be done FIRST when a new risk scenario has been identified
Which of the following is a risk practitioner ' s BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
It is MOST important that security controls for a new system be documented in:
Which of the following is the GREATEST risk associated with inappropriate classification of data?
During the creation of an organization ' s IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:
Which of the following is the MOST important metric to monitor the performance of the change management process?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
Which of the following would provide the MOST objective assessment of the effectiveness of an organization ' s security controls?
Recovery the objectives (RTOs) should be based on
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
Which of the following is MOST important for managing ethical risk?
Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?
Which of the following would provide the MOST useful information for communicating an organization’s risk level to senior management?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?