Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?
Which of the following is the MOST reliable validation of a new control?
The MAIN goal of the risk analysis process is to determine the:
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:
The percentage of unpatched systems is a:
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner ' s
BEST course of action?
The MAIN purpose of conducting a control self-assessment (CSA) is to:
A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?
IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:
Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?
Which of the following provides the MOST useful information to determine risk exposure following control implementations?
Who should be responsible (of evaluating the residual risk after a compensating control has been
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
Which of the following BEST supports ethical IT risk management practices?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following is MOST useful when communicating risk to management?
A risk assessment has been completed on an application and reported to the application owner. The report includes validated vulnerability findings that require mitigation. Which of the following should be the NEXT step?
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
Which of the following BEST helps to balance the costs and benefits of managing IT risk?
Which of the following is the BEST way to identify changes in the risk profile of an organization?
Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?
Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
Well-developed, data-driven risk measurements should be:
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
Which of the following provides the BEST indication that existing controls are effective?
Which of the following is the BEST method to identify unnecessary controls?
The GREATEST concern when maintaining a risk register is that:
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Which of the following is MOST important when discussing risk within an organization?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?
Which of the following would be a risk practitioner ' $ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?
Which of the following provides the BEST level of assurance to an organization that its vendors ' controls are effective?
Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?
A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain
access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?
Which of the following controls will BEST mitigate risk associated with excessive access privileges?
Key risk indicators (KRIs) BEST support risk treatment when they: