During an organization's simulated phishing email campaign, which of the following is the BEST indicator of a mature security awareness program?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?
Which of the following BEST enables effective risk-based decision making?
Which of the following provides the MOST useful information when developing a risk profile for management approval?
An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?
Which of The following BEST represents the desired risk posture for an organization?
Which of the following is MOST important for an organization that wants to reduce IT operational risk?
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
Which of the following is the BEST indicator of an effective IT security awareness program?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
Which of the following should be the MAIN consideration when validating an organization's risk appetite?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?
Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?
Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
Which of the following is the MOST important consideration when prioritizing risk response?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
Which of the following would BEST help to ensure that suspicious network activity is identified?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
Which of the following is the MOST effective way to mitigate identified risk scenarios?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?
Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
Who is the MOST appropriate owner for newly identified IT risk?
Which of the following is a specific concern related to machine learning algorithms?
Which of the following would BEST provide early warning of a high-risk condition?
Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
Which of the following is the BEST way for an organization to enable risk treatment decisions?
The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?
An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?
The MAIN goal of the risk analysis process is to determine the:
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?
In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
Which of the following would BEST facilitate the maintenance of data classification requirements?
An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?
Of the following, who should be responsible for determining the inherent risk rating of an application?
Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?