Which of these documents is MOST important to request from a cloud service
provider during a vendor risk assessment?
Who is accountable for the process when an IT stakeholder operates a key control to address a risk scenario?
Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following is the MOST important responsibility of a risk owner?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?
Performing a background check on a new employee candidate before hiring is an example of what type of control?
A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
Which of the following problems is BEST solved by a cloud access security broker (CASB)?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?
Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?
The PRIMARY benefit of classifying information assets is that it helps to:
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
Who should be PRIMARILY responsible for establishing an organization's IT risk culture?
Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?
Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?
An updated report from a trusted research organization shows that attacks have increased in the organization's industry segment. What should be done FIRST to integrate this data into risk assessments?
Which of the following BEST indicates whether security awareness training is effective?
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
The PRIMARY benefit associated with key risk indicators (KRls) is that they:
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
Which of the following BEST enables detection of ethical violations committed by employees?
An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?
An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?
An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:
As part of an overall IT risk management plan, an IT risk register BEST helps management:
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
Which of the following is the BEST method of creating risk awareness in an organization?
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
Which of the following functions independently reviews and provides feedback regarding the achievement of organizational objectives?
Which of the following will provide the BEST measure of compliance with IT policies?
Which of the following BEST helps to identify significant events that could impact an organization?
Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?