Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
Which of the following MOST effectively limits the impact of a ransomware attack?
Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
Which of the following BEST mitigates ethical risk?
Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?
Which of the following is the BEST way to assess the effectiveness of an access management process?
What is senior management's role in the RACI model when tasked with reviewing monthly status reports provided by risk owners?
Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r
Who should be responsible for strategic decisions on risk management?
Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization's:
An IT risk practitioner has been tasked to engage key stakeholders to assess risk for key IT risk scenarios. Which of the following is the PRIMARY benefit of this activity?
Which of the following is MOST helpful to understand the consequences of an IT risk event?
Which of the following is the BEST approach for determining whether a risk action plan is effective?
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?
Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
Which of the following would provide the MOST comprehensive information for updating an organization's risk register?
What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Which of the following is MOST important when developing risk scenarios?
What is the PRIMARY reason to periodically review key performance indicators (KPIs)?
Which of the following is the BEST way to identify changes in the risk profile of an organization?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
Who is MOST appropriate to be assigned ownership of a control
Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?
Which of the following is the BEST metric to measure the effectiveness of an organization's disaster recovery program?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?
Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?
Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
Which of the following groups represents the first line of defense?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
Which of the following would BEST help an enterprise define and communicate its risk appetite?
Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?
An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?
Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?