Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?
A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
Which of the following will MOST likely change as a result of the decrease in risk appetite due to a new privacy regulation?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?
Which of the following is the MOST important consideration for the board and senior leadership
regarding the organization's approach to risk management for emerging technologies?
An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on the organization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?
Which of the following BEST enables detection of ethical violations committed by employees?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?
An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner's BEST course of action?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
Which of the following is MOST important to determine as a result of a risk assessment?
Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
When assigning control ownership, it is MOST important to verify that the owner has accountability for:
A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
The PRIMARY reason for communicating risk assessment results to data owners is to enable the:
Which of the following is the PRIMARY benefit of consistently recording risk assessment results in the risk register?
Which types of controls are BEST used to minimize the risk associated with a vulnerability?
Which of the following is the BEST way to validate whether controls to reduce user device vulnerabilities have been implemented according to management's action plan?
Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?
Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?
Which of the following is the MOST useful input when developing risk scenarios?
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?
A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?
A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago. Which of the following is the GREATEST concern with this request?
Which of the following is the MOST useful input when developing risk scenarios?
Which of the following is MOST helpful when prioritizing action plans for identified risk?
Which of the following would BEST facilitate the maintenance of data classification requirements?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
Which of the following is a risk practitioner's BEST recommendation regarding disaster recovery management (DRM) for Software as a Service (SaaS) providers?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?
In the three lines of defense model, a PRIMARY objective of the second line is to:
When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?