Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:
An organization has decided to outsource a web application, and customer data will be stored in the vendor's public cloud. To protect customer data, it is MOST important to ensure which of the following?
Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Which of the following BEST contributes to the implementation of an effective risk response action plan?
Which of the following would present the GREATEST challenge when assigning accountability for control ownership?
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
What is MOST important for the risk practitioner to understand when creating an initial IT risk register?
An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:
Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?
A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?
Which of the following can be interpreted from a single data point on a risk heat map?
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following BEST measures the efficiency of an incident response process?
An organization has raised the risk appetite for technology risk. The MOST likely result would be:
Which of the following activities should be performed FIRST when establishing IT risk management processes?
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
Which of the following is MOST important when discussing risk within an organization?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
Which of the following is the MOST important reason to communicate control effectiveness to senior management?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?
Who is the BEST person to an application system used to process employee personal data?
An organization recently implemented a cybersecurity awareness program that includes phishing simulation exercises for all employees. What type of control is being utilized?
Which of the following is the BEST approach for obtaining management buy-in
to implement additional IT controls?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?