For a large software development project, risk assessments are MOST effective when performed:
The BEST indication that risk management is effective is when risk has been reduced to meet:
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
The BEST reason to classify IT assets during a risk assessment is to determine the:
An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?
Which of the following is the BEST indication of a mature organizational risk culture?
In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner's BEST recommendation to further reduce the impact of ransomware attacks would be to implement:
An organization's IT infrastructure is running end-of-life software that is not allowed without exception approval. Which of the following would provide the MOST helpful information to justify investing in updated software?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?
Which of the following is the GREATEST advantage of implementing a risk management program?
An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the country where it is collected. Which of the following should be done FIRST when addressing this situation?
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?