Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?
Which of the following is the BEST control to minimize the risk associated with scope creep in software development?
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within the organization of the following, who should review the completed list and select the appropriate KRIs for implementation?
When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:
A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?
Which of the following is the BEST method for assessing control effectiveness?
The objective of aligning mitigating controls to risk appetite is to ensure that:
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner's NEXT step?
An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:
Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
The BEST metric to demonstrate that servers are configured securely is the total number of servers:
Which of the following is MOST helpful in providing an overview of an organization's risk management program?
When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
When evaluating a number of potential controls for treating risk, it is MOST important to consider:
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
An organization is considering the adoption of an aggressive business strategy to achieve desired growth From a risk management perspective what should the risk practitioner do NEXT?
Which of the following is MOST important for senior management to review during an acquisition?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''
Which of the following sources is MOST relevant to reference when updating security awareness training materials?
Which of the following provides the MOST useful information to assess the magnitude of identified deficiencies in the IT control environment?
Which of the following is PRIMARILY a risk management responsibly of the first line of defense?
Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?
An organization's business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner's PRIMARY consideration when participating in development of the new strategy?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?