Which of the following is the MOST important document regarding the treatment of sensitive data?
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?
Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?
Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?
Which of the following is MOST important to identify when developing top-down risk scenarios?
An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?
A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?
Which of the following BEST indicates the effective implementation of a risk treatment plan?
A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?
Which of the following will BEST help to improve an organization's risk culture?
After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?
An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?
Which of the following will BEST ensure that controls adequately support business goals and objectives?
Which of the following is the MOST important update for keeping the risk register current?
Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
Which of the following BEST indicates the condition of a risk management program?
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
An organization practices the principle of least privilege. To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
The MAIN purpose of reviewing a control after implementation is to validate that the control:
Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?
An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?
Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?
Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
Winch of the following is the BEST evidence of an effective risk treatment plan?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
A service provider is managing a client’s servers. During an audit of the service, a noncompliant control is discovered that will not be resolved before the next audit because the client cannot afford the downtime required to correct the issue. The service provider’s MOST appropriate action would be to:
Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
Which of the following is a drawback in the use of quantitative risk analysis?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?