Which of the following is the BEST method to maintain a common view of IT risk within an organization?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
Which of the following is the MOST important enabler of effective risk management?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
Which of the following is the GREATEST risk to an organization when using a public AI system to process credit card transactions?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Which of the following BEST indicates that an organization ' s risk management processes are mature?
An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:
The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:
Which of the following is the MOST common concern associated with outsourcing to a service provider?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:
An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?
Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?
Which of the following BEST measures the impact of business interruptions caused by an IT service outage?
In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
Which of the following BEST enables the identification of trends in risk levels?
Which of the following BEST reduces the likelihood of employees unintentionally disclosing sensitive information to outside parties?
Which of the following BEST enables an organization to increase the likelihood of identifying risk associated with unethical employee behavior?
A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?
The PRIMARY reason to implement a formalized risk taxonomy is to:
The objective of aligning mitigating controls to risk appetite is to ensure that:
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following would BEST help an enterprise prioritize risk scenarios?
Which of the following is the MOST important reason to revisit a previously accepted risk?
Which of the following is the GREATEST benefit of centralizing IT systems?
An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner ' s MOST important action related to this decision?
A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:
A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner ' s BEST course of action when a compensating control needs to be applied?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?
Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:
An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager ' s BEST course of action?
Risk aggregation in a complex organization will be MOST successful when:
Following an acquisition, the acquiring company ' s risk practitioner has been asked to update the organization ' s IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?
An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner ' s BEST recommendation?
Which of the following is the MOST valuable data source to support the optimization of an existing key risk indicator (KRI)?
Which of the following approaches BEST identifies information systems control deficiencies?
The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:
Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?
Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?
When of the following 15 MOST important when developing a business case for a proposed security investment?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:
Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?
Which of the following is MOST important to ensure when reviewing an organization ' s risk register?
Which of the following BEST enables an organization to address risk associated with technical complexity?