An organization recently configured a new business division Which of the following is MOST likely to be affected?
When testing the security of an IT system, il is MOST important to ensure that;
Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?
Which of the following problems is BEST solved by a cloud access security broker (CASB)?
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach
The FIRST task when developing a business continuity plan should be to:
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following is the MOST critical consideration when awarding a project to a third-party service provider whose servers are located offshore?
Which of the following practices MOST effectively safeguards the processing of personal data?
Which of the following key risk indicators (KRIs) provides the BEST insight into the risk associated with IT systems being unable to meet the required availability service level in the future?
An organization's financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
Which of the following is MOST influential when management makes risk response decisions?
Within the three lines of defense model, the responsibility for managing risk and controls resides with:
Which of the following is the result of a realized risk scenario?
Which of the following should be management's PRIMARY consideration when approving risk response action plans?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following BEST facilitates the identification of emerging risk?
Which of the following is the MOST important consideration when prioritizing risk response?
Which of the following is MOST important for senior management to review during an acquisition?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
The MOST important consideration when selecting a control to mitigate an identified risk is whether:
Which of the following will BEST support management reporting on risk?
An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization's customer service operations overseas. Which of the following would MOST significantly impact management's decision?
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?
Which of the following is the PRIMARY purpose of creating and documenting control procedures?
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Mapping open risk issues to an enterprise risk heat map BEST facilitates:
Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?
Changes in which of the following are MOST likely to trigger the need to reassess inherent risk?
Which of the following provides the MOST reliable evidence of a control's effectiveness?
Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?
A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
Which of the following is the PRIMARY objective of the three lines model for risk management?
it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Which of the following is MOST useful when communicating risk to management?
Which of the following MUST be updated to maintain an IT risk register?
When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?
Which of the following is MOST important to identify when developing top-down risk scenarios?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?