Which of the following would BEST enable a risk practitioner to embed risk management within the organization?
Which of the following functions can be performed by any of the three lines of defense?
An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?
When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?
From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?
A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
Which of the following is the MOST effective way lo ensure professional ethics are maintained as a core organizational value and adhered to by employees?
Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
Which of the following is the BEST recommendation when a key risk indicator (KRI) is generating an excessive volume of events?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?
One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
Which of the following is the BEST approach for selecting controls to minimize risk?
Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:
Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?
A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:
Which of the following provides the BEST indication that existing controls are effective?
Which of the following is the PRIMARY benefit of implementing key control indicators (KCIs)?
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?
Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:
IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?
In the three lines of defense model, a PRIMARY objective of the second line is to:
Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?
Which of the following BEST enables the timely detection of changes in the security control environment?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Which of the following is the MAIN reason for documenting the performance of controls?
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
Which of the following is the BEST key performance indicator (KPI) for a server patch management process?
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Which of the following has the GREATEST influence on an organization's risk appetite?
Which of the following should be the PRIMARY input to determine risk tolerance?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?