Which of the following MOST effectively limits the impact of a ransomware attack?
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
Which of the following is MOST important for a risk practitioner to confirm once a risk action plan has been completed?
Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?
A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?
While reviewing an organization's monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
An organization practices the principle of least privilege. To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:
To enable effective risk governance, it is MOST important for senior management to:
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
An IT risk practitioner has been tasked to engage key stakeholders to assess risk for key IT risk scenarios. Which of the following is the PRIMARY benefit of this activity?
Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
Which of the following is the BEST way to support communication of emerging risk?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
Which of the following would be MOST useful to management when allocating resources to mitigate risk to the organization?
Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?
Which of the following is MOST likely to be impacted when a global organization is required by law to implement a new data protection regulation across its operations?
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?
Which of the following cloud service models is MOST appropriate for client organizations that want to maximize their control over management of the data life cycle?
An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?
Before selecting a final risk response option for a given risk scenario, management should FIRST:
Which of the following is MOST helpful in aligning IT risk with business objectives?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following should be considered FIRST when creating a comprehensive IT risk register?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?
An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?
Which of the following is the MOST important consideration when selecting digital signature software?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?
Which of the following provides the MOST insight into an organization's IT threat exposure?
Which of the following is the BEST metric to measure employee adherence to organizational security policies?
Which of the following should be accountable for ensuring that media containing financial information are adequately destroyed per an organization's data disposal policy?