The PRIMARY benefit of classifying information assets is that it helps to:
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?
Before implementing instant messaging within an organization using a public solution, which of the following should be in place to mitigate data leakage risk?
Which of the following is the PRIMARY benefit of consistently recording risk assessment results in the risk register?
Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following BEST indicates that an organization's disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
Which of the following is the PRIMARY reason that risk management is important in project management?
Which of the following should be the PRIMARY input to determine risk tolerance?
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?
An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following presents the GREATEST challenge to managing an organization's end-user devices?
Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?
A risk practitioner notices that a particular key risk indicator (KRI) has remained below its established trigger point for an extended period of time. Which of the following should be done FIRST?
Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?
An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?
Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?
Which of the following is the BEST indicator of the effectiveness of a control monitoring program?
Which of the following resources is MOST helpful to a risk practitioner when updating the likelihood rating in the risk register?
Which of the following controls will BEST mitigate risk associated with excessive access privileges?
An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?
Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?
The BEST criteria when selecting a risk response is the:
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Which of the following is the GREATEST concern associated with the lack of proper control monitoring?
Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?
Which of the following is the MOST important success factor when introducing risk management in an organization?
Which of the following is the MOST important reason to create risk scenarios?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
The percentage of unpatched systems is a:
Which of the following is the BEST way to ensure ongoing control effectiveness?
Controls should be defined during the design phase of system development because:
Which of the following BEST reduces the risk associated with the theft of a laptop containing sensitive information?
A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?
Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
Which of the following key risk indicators (KRIs) provides the BEST insight into the risk associated with IT systems being unable to meet the required availability service level in the future?
Which of the following has the GREATEST influence on an organization's risk appetite?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
In order to determining a risk is under-controlled the risk practitioner will need to
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?