Which of the following is the MOST important metric to monitor the performance of the change management process?
Which of the following would BEST help an enterprise define and communicate its risk appetite?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?
Which of the following provides the MOST useful information to senior management about risk mitigation status?
When testing the security of an IT system, il is MOST important to ensure that;
Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
Which of the following should be considered FIRST when managing a risk event related to theft and disclosure of customer information?
An organization mandates the escalation of a service ticket when a key application is offline for 5 minutes or more due to potential risk exposure. The risk practitioner has been asked by management to prepare a report of application offline times using both 3- and 5-minute thresholds. What does the 3-minute threshold represent?
An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
Which of the following is the BEST indicator of the effectiveness of a control?
Which of the following BEST indicates that an organization has implemented IT performance requirements?
A risk practitioner finds that data has been misclassified. Which of the following is the GREATEST concern?
An organization does not have a defined process to revoke IT access of staff members who have changed roles within the organization. Which of the following is the GREATEST concern associated with this deficiency?
Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?
Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Which of the following is the MOST important reason to revisit a previously accepted risk?
Which of the following situations would cause the GREATEST concern around the integrity of application logs?
Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
Which of the following is the BEST method to maintain a common view of IT risk within an organization?
The risk associated with an asset after controls are applied can be expressed as:
Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?
Which of the following would be MOST effective in monitoring changes in an organization's IT risk environment?
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?
Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner's GREATEST concern?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?
Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for
sensitive data?
An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following should a risk practitioner do NEXT after learning that Internet of Things (IoT) devices installed in the production environment lack appropriate security controls for sensitive data?