Which of the following is the MOST important consideration when sharing risk management updates with executive management?
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner ' s BEST course of action?
A risk practitioner has discovered a deficiency in a critical system that cannot be patched. Which of the following should be the risk practitioner ' s FIRST course of action?
A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?
Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?
After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?
An organization has implemented immutable backups to prevent successful ransomware attacks. Which of the following is the MOST effective control for the risk practitioner to review?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Which of the following is the MAIN reason for documenting the performance of controls?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
Which of the following is the MOST effective way to help ensure accountability for managing risk?
A risk practitioner is preparing a report to communicate changes in the risk and control environment. The BEST way to engage stakeholder attention is to:
The PRIMARY focus of an ongoing risk awareness program should be to:
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
A public online information security training course is available to an organization ' s staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization ' s risk practitioner?
The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to:
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
Which of the following is MOST important to understand when determining an appropriate risk assessment approach?
Which of the following is the PRIMARY consideration when determining the impact to an organization after the discovery of malware on an endpoint device?
Who should be accountable for authorizing information system access to internal users?
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization ' s technical environment?
Which of the following is MOST important to enable well-informed cybersecurity risk decisions?
An organization is implementing Internet of Things (IoT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
Which of the following is MOST important to review when determining whether a potential IT service provider’s control environment is effective?
Which of the following should be done FIRST when a new risk scenario has been identified
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
Before assigning sensitivity levels to information it is MOST important to:
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Quantifying the value of a single asset helps the organization to understand the:
To drive effective risk management, it is MOST important that an organization ' s policy framework is:
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner ' s FIRST course of action?
Which of the following is the PRIMARY purpose of a risk register?
When determining risk ownership, the MAIN consideration should be:
The MOST important characteristic of an organization s policies is to reflect the organization ' s:
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner ' s BEST recommendation after recovery steps have been completed?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Which of the following is a PRIMARY benefit to an organization that is using threat intelligence?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
To ensure key risk indicators (KRIs) are effective and meaningful, the KRIs should be aligned to:
TESTED 15 Apr 2026