An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
Which of the following provides the MOST useful information when measuring the progress of risk response action plans?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?
Of the following, who is responsible for approval when a change in an application system is ready for release to production?
Which of the following is the MOST effective control to maintain the integrity of system configuration files?
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner's NEXT course of action?
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
The MOST important consideration when selecting a control to mitigate an identified risk is whether:
Which of the following will BEST ensure that controls adequately support business goals and objectives?
What would be a risk practitioner's BEST recommendation when several key performance indicators (KPIs) for a control process fail to meet service level agreements (SLAs)?
Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
Which of the following is the GREATEST impact of implementing a risk mitigation strategy?
Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
Which of the following is MOST helpful in providing an overview of an organization's risk management program?
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following BEST enables effective risk-based decision making?
Which of the following BEST indicates that an organizations risk management program is effective?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
The BEST reason to classify IT assets during a risk assessment is to determine the:
Which of the following BEST measures the efficiency of an incident response process?
An organization plans to provide specific cloud security training for the IT team to help manage risks associated with cloud technology. This response is considered risk:
Which of the following is a KEY responsibility of the second line of defense?
The MOST essential content to include in an IT risk awareness program is how to:
Which of the following is MOST important to identify when developing generic risk scenarios?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
Which of the following should be a risk practitioner's NEXT step upon learning the impact of an organization's noncompliance with a specific legal regulation?
Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
Which of the following is MOST important to enable well-informed cybersecurity risk decisions?
An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?
The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?
Which of the following is the BEST method to track asset inventory?
A public online information security training course is available to an organization's staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization's risk practitioner?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
The BEST criteria when selecting a risk response is the:
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Which of the following BEST indicates effective information security incident management?
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization's data flow model?
Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?
Which of the following would BEST indicate to senior management that IT processes are improving?
Which of the following would BEST facilitate the implementation of data classification requirements?
A maturity model is MOST useful to an organization when it:
Which of the following risk scenarios should be considered in a disaster recovery plan (DRP)?