An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?
After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:
Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?
Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following is the GREATEST benefit for an organization with a strong risk awareness culture?
Which type of indicators should be developed to measure the effectiveness of an organization's firewall rule set?
A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?
Which of the following is MOST helpful in aligning IT risk with business objectives?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
When of the following provides the MOST tenable evidence that a business process control is effective?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization's enterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
Which of the following is the BEST way to assess the effectiveness of an access management process?
When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?
Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Which of the following provides the MOST useful information when determining if a specific control should be implemented?
Which of the following is the STRONGEST indication an organization has ethics management issues?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
Risk acceptance of an exception to a security control would MOST likely be justified when:
Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?
Which of the following practices MOST effectively safeguards the processing of personal data?
Which of the following should be done FIRST when information is no longer required to support business objectives?
Which of the following will BEST help in communicating strategic risk priorities?
Which of the following BEST indicates the efficiency of a process for granting access privileges?
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:
Which of the following is MOST helpful in preventing risk events from materializing?
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Which of the following is MOST important to include in a risk assessment of an emerging technology?
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?
Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?