Special Summer Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CRISC

CRISC Certified in Risk and Information Systems Control Question and Answers

Question # 4

Which of the following should be the HIGHEST priority when developing a risk response?

A.

The risk response addresses the risk with a holistic view.

B.

The risk response is based on a cost-benefit analysis.

C.

The risk response is accounted for in the budget.

D.

The risk response aligns with the organization's risk appetite.

Full Access
Question # 5

An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?

A.

The third party's IT operations manager

B.

The organization's process owner

C.

The third party's chief risk officer (CRO)

D.

The organization's risk practitioner

Full Access
Question # 6

Which types of controls are BEST used to minimize the risk associated with a vulnerability?

A.

Detective

B.

Preventive

C.

Deterrent

D.

Directive

Full Access
Question # 7

A global organization has implemented an application that does not address all privacy requirements across multiple jurisdictions. Which of the following risk responses has the organization adopted with regard to privacy requirements?

A.

Risk avoidance

B.

Risk transfer

C.

Risk mitigation

D.

Risk acceptance

Full Access
Question # 8

Which of the following BEST indicates the effectiveness of anti-malware software?

A.

Number of staff hours lost due to malware attacks

B.

Number of downtime hours in business critical servers

C.

Number of patches made to anti-malware software

D.

Number of successful attacks by malicious software

Full Access
Question # 9

Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?

A.

A management-approved risk dashboard

B.

A current control framework

C.

A regularly updated risk register

D.

Regularly updated risk management procedures

Full Access
Question # 10

Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?

A.

Analyzing cyber intelligence reports

B.

Engaging independent cybersecurity consultants

C.

Increasing the frequency of updates to the risk register

D.

Reviewing the outcome of the latest security risk assessment

Full Access
Question # 11

When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:

A.

information risk assessments with enterprise risk assessments.

B.

key risk indicators (KRIs) with risk appetite of the business.

C.

the control key performance indicators (KPIs) with audit findings.

D.

control performance with risk tolerance of business owners.

Full Access
Question # 12

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

A.

To provide a basis for determining the criticality of risk mitigation controls

B.

To provide early warning signs of a potential change in risk level

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide insight into the effectiveness of the intemnal control environment

Full Access
Question # 13

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

Full Access
Question # 14

Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?

A.

It facilitates the use of a framework for risk management.

B.

It establishes a means for senior management to formally approve risk practices.

C.

It encourages risk-based decision making for stakeholders.

D.

It provides a basis for benchmarking against industry standards.

Full Access
Question # 15

Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?

A.

Digital signature

B.

Edit checks

C.

Encryption

D.

Multifactor authentication

Full Access
Question # 16

From a risk management perspective, the PRIMARY objective of using maturity models is to enable:

A.

solution delivery.

B.

resource utilization.

C.

strategic alignment.

D.

performance evaluation.

Full Access
Question # 17

Which of the following should be reported periodically to the risk committee?

A.

System risk and control matrix

B.

Emerging IT risk scenarios

C.

Changes to risk assessment methodology

D.

Audit committee charter

Full Access
Question # 18

A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?

A.

Risk ownership is not being assigned properly.

B.

The organization has a high level of risk appetite.

C.

Risk management procedures are outdated.

D.

The organization's risk awareness program is ineffective.

Full Access
Question # 19

A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?

A.

Multiple corporate build images exist.

B.

The process documentation was not updated.

C.

The IT build process was not followed.

D.

Threats are not being detected.

Full Access
Question # 20

Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?

A.

Monitoring the risk until the exposure is reduced

B.

Setting minimum sample sizes to ensure accuracy

C.

Listing alternative causes for risk events

D.

Illustrating changes in risk trends

Full Access
Question # 21

Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?

A.

Refer to industry standard scenarios.

B.

Use a top-down approach.

C.

Consider relevant business activities.

D.

Use a bottom-up approach.

Full Access
Question # 22

Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?

A.

Cyber threat intelligence

B.

Anti-malware software

C.

Endpoint detection and response (EDR)

D.

SIEM systems

Full Access
Question # 23

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:

A.

data classification and labeling.

B.

data logging and monitoring.

C.

data retention and destruction.

D.

data mining and analytics.

Full Access
Question # 24

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Assigning a data owner

B.

Implementing technical control over the assets

C.

Implementing a data loss prevention (DLP) solution

D.

Scheduling periodic audits

Full Access
Question # 25

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?

A.

Develop new loT risk scenarios.

B.

Implement loT device monitoring software.

C.

Introduce controls to the new threat environment.

D.

Engage external security reviews.

Full Access
Question # 26

An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:

A.

a recognized industry control framework

B.

guidance provided by the external auditor

C.

the service provider's existing controls

D.

The organization's specific control requirements

Full Access
Question # 27

Which of the following is the MOST effective way to help ensure accountability for managing risk?

A.

Assign process owners to key risk areas.

B.

Obtain independent risk assessments.

C.

Assign incident response action plan responsibilities.

D.

Create accurate process narratives.

Full Access
Question # 28

An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:

A.

risk mitigation.

B.

risk evaluation.

C.

risk appetite.

D.

risk tolerance.

Full Access
Question # 29

Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?

A.

Deleting the data from the file system

B.

Cryptographically scrambling the data

C.

Formatting the cloud storage at the block level

D.

Degaussing the cloud storage media

Full Access
Question # 30

An organization has an internal control that requires all access for employees be removed within 15 days of their termination date. Which of the following should the risk practitioner use to monitor

adherence to the 15-day threshold?

A.

Operation level agreement (OLA)

B.

Service level agreement (SLA)

C.

Key performance indicator (KPI)

D.

Key risk indicator (KRI)

Full Access
Question # 31

An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?

A.

Recommend additional controls to address the risk.

B.

Update the risk tolerance level to acceptable thresholds.

C.

Update the incident-related risk trend in the risk register.

D.

Recommend a root cause analysis of the incidents.

Full Access
Question # 32

The PRIMARY reason to implement a formalized risk taxonomy is to:

A.

reduce subjectivity in risk management.

B.

comply with regulatory requirements.

C.

demonstrate best industry practice.

D.

improve visibility of overall risk exposure.

Full Access
Question # 33

Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?

A.

Conduct penetration testing.

B.

Interview IT operations personnel.

C.

Conduct vulnerability scans.

D.

Review change control board documentation.

Full Access
Question # 34

When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:

A.

is correlated to risk and tracks variances in the risk.

B.

is assigned to IT processes and projects with a low level of risk.

C.

has a high correlation with the process outcome.

D.

triggers response based on risk thresholds.

Full Access
Question # 35

Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

A.

It maintains evidence of compliance with risk policy.

B.

It facilitates timely risk-based decisions.

C.

It validates the organization's risk appetite.

D.

It helps to mitigate internal and external risk factors.

Full Access
Question # 36

Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?

A.

Business case documentation

B.

Organizational risk appetite statement

C.

Enterprise architecture (EA) documentation

D.

Organizational hierarchy

Full Access
Question # 37

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?

A.

Collaborate with the risk owner to determine the risk response plan.

B.

Document the gap in the risk register and report to senior management.

C.

Include a right to audit clause in the service provider contract.

D.

Advise the risk owner to accept the risk.

Full Access
Question # 38

Which of the following is the MOST important benefit of reporting risk assessment results to senior management?

A.

Promotion of a risk-aware culture

B.

Compilation of a comprehensive risk register

C.

Alignment of business activities

D.

Facilitation of risk-aware decision making

Full Access
Question # 39

An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?

A.

Risk tolerance

B.

Risk appetite

C.

Inherent risk

D.

Residual risk

Full Access
Question # 40

Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?

A.

Encrypted storage of data

B.

Links to source data

C.

Audit trails for updates and deletions

D.

Check totals on data records and data fields

Full Access
Question # 41

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

A.

Develop a compensating control.

B.

Allocate remediation resources.

C.

Perform a cost-benefit analysis.

D.

Identify risk responses

Full Access
Question # 42

A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago. Which of the following is the GREATEST concern with this request?

A.

The risk assessment team may be overly confident of its ability to identify issues.

B.

The risk practitioner may be unfamiliar with recent application and process changes.

C.

The risk practitioner may still have access rights to the financial system.

D.

Participation in the risk assessment may constitute a conflict of interest.

Full Access
Question # 43

Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?

A.

Communicating risk awareness materials regularly

B.

Establishing key risk indicators (KRIs) to monitor risk management processes

C.

Ensuring that business activities minimize inherent risk

D.

Embedding risk management in business activities

Full Access
Question # 44

Which of the following should be considered FIRST when creating a comprehensive IT risk register?

A.

Risk management budget

B.

Risk mitigation policies

C.

Risk appetite

D.

Risk analysis techniques

Full Access
Question # 45

An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?

A.

Communicate sanctions for policy violations to all staff.

B.

Obtain signed acceptance of the new policy from employees.

C.

Train all staff on relevant information security best practices.

D.

Implement data loss prevention (DLP) within the corporate network.

Full Access
Question # 46

Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?

A.

Internet of Things (IoT)

B.

Quantum computing

C.

Virtual reality (VR)

D.

Machine learning

Full Access
Question # 47

Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?

A.

The number of threats to the system

B.

The organization's available budget

C.

The number of vulnerabilities to the system

D.

The level of acceptable risk to the organization

Full Access
Question # 48

Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?

A.

Perform a business case analysis

B.

Implement compensating controls.

C.

Conduct a control sell-assessment (CSA)

D.

Build a provision for risk

Full Access
Question # 49

Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?

A.

Perform a gap analysis

B.

Conduct system testing

C.

Implement compensating controls

D.

Update security policies

Full Access
Question # 50

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs assist in the preparation of the organization's risk profile.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization

D.

KRIs provide an early warning that a risk threshold is about to be reached.

Full Access
Question # 51

Who is MOST appropriate to be assigned ownership of a control

A.

The individual responsible for control operation

B.

The individual informed of the control effectiveness

C.

The individual responsible for resting the control

D.

The individual accountable for monitoring control effectiveness

Full Access
Question # 52

An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?

A.

Conducting periodic vulnerability scanning

B.

Creating immutable backups

C.

Performing required patching

D.

Implementing continuous intrusion detection monitoring

Full Access
Question # 53

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

A.

introduced into production without high-risk issues.

B.

having the risk register updated regularly.

C.

having key risk indicators (KRIs) established to measure risk.

D.

having an action plan to remediate overdue issues.

Full Access
Question # 54

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

A.

Management approval

B.

Annual review

C.

Relevance

D.

Automation

Full Access
Question # 55

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

A.

Control effectiveness

B.

Risk appetite

C.

Risk likelihood

D.

Key risk indicator (KRI)

Full Access
Question # 56

Recovery the objectives (RTOs) should be based on

A.

minimum tolerable downtime

B.

minimum tolerable loss of data.

C.

maximum tolerable downtime.

D.

maximum tolerable loss of data

Full Access
Question # 57

After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;

A.

prepare an IT risk mitigation strategy.

B.

escalate to senior management.

C.

perform a cost-benefit analysis.

D.

review the impact to the IT environment.

Full Access
Question # 58

Which of the following is MOST useful input when developing risk scenarios?

A.

Common attacks in other industries.

B.

Identification of risk events.

C.

Impact on critical assets.

D.

Probability of disruptive risk events.

Full Access
Question # 59

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The methodology used to perform the risk assessment

B.

Action plans to address risk scenarios requiring treatment

C.

Date and status of the last project milestone

D.

The individuals assigned ownership of controls

Full Access
Question # 60

Which of the following is BEST measured by key control indicators (KCIs)?

A.

Historical trends of the organizational risk profile

B.

Cost efficiency of risk treatment plan projects

C.

Comprehensiveness of risk assessment procedures

D.

Effectiveness of organizational defense in depth

Full Access
Question # 61

A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

A.

Conduct a gap analysis.

B.

Terminate the outsourcing agreement.

C.

Identify compensating controls.

D.

Transfer risk to the third party.

Full Access
Question # 62

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

A.

Assemble an incident response team.

B.

Create a disaster recovery plan (DRP).

C.

Develop a risk response plan.

D.

Initiate a business impact analysis (BIA).

Full Access
Question # 63

An organization's capability to implement a risk management framework is PRIMARILY influenced by the:

A.

guidance of the risk practitioner.

B.

competence of the staff involved.

C.

approval of senior management.

D.

maturity of its risk culture.

Full Access
Question # 64

An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?

A.

Secure encryption protocols are utilized.

B.

Multi-factor authentication is set up for users.

C.

The solution architecture is approved by IT.

D.

A risk transfer clause is included in the contact

Full Access
Question # 65

Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?

A.

The model could be hacked or exploited.

B.

The model could be used to generate inaccurate content.

C.

Staff could become overly reliant on the model.

D.

It could lead to biased recommendations.

Full Access
Question # 66

Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?

A.

Proportion of end users having more than one account

B.

Percentage of accounts disabled within the service level agreement (SLA)

C.

Proportion of privileged to non-privileged accounts

D.

Percentage of accounts that have not been activated

Full Access
Question # 67

After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

A.

A decrease in threats

B.

A change in the risk profile

C.

An increase in reported vulnerabilities

D.

An increase in identified risk scenarios

Full Access
Question # 68

Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?

A.

Stakeholder preferences

B.

Contractual requirements

C.

Regulatory requirements

D.

Management assertions

Full Access
Question # 69

Within the three lines of defense model, the responsibility for managing risk and controls resides with:

A.

operational management.

B.

the risk practitioner.

C.

the internal auditor.

D.

executive management.

Full Access
Question # 70

Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?

A.

To identify gaps in data protection controls

B.

To develop a customer notification plan

C.

To identify personally identifiable information (Pll)

D.

To determine gaps in data identification processes

Full Access
Question # 71

The BEST way for an organization to ensure that servers are compliant to security policy is

to review:

A.

change logs.

B.

configuration settings.

C.

server access logs.

D.

anti-malware compliance.

Full Access
Question # 72

Which of the following BEST enables the timely detection of changes in the security control environment?

A.

Control self-assessment (CSA)

B.

Log analysis

C.

Security control reviews

D.

Random sampling checks

Full Access
Question # 73

Which of the following should be the PRIMARY input to determine risk tolerance?

A.

Regulatory requirements

B.

Organizational objectives

C.

Annual loss expectancy (ALE)

D.

Risk management costs

Full Access
Question # 74

Following the implementation of an Internet of Things (loT) solution, a risk practitioner identifies new risk factors with impact to existing controls. Which of the following is MOST important to include in a report to stakeholders?

A.

Identified vulnerabilities

B.

Business managers' concerns

C.

Changes to residual risk

D.

Risk strategies of peer organizations

Full Access
Question # 75

What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?

A.

Reduce internal threats

B.

Reduce exposure to vulnerabilities

C.

Eliminate risk associated with personnel

D.

Ensure new hires have the required skills

Full Access
Question # 76

A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:

A.

mature

B.

ineffective.

C.

optimized.

D.

inefficient.

Full Access
Question # 77

A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?

A.

Re-evaluate the organization's risk appetite.

B.

Outsource the cybersecurity function.

C.

Purchase cybersecurity insurance.

D.

Review cybersecurity incident response procedures.

Full Access
Question # 78

A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?

A.

Threats are not being detected.

B.

Multiple corporate build images exist.

C.

The IT build process was not followed.

D.

The process documentation was not updated.

Full Access
Question # 79

Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?

A.

The criticality of the asset

B.

The vulnerability profile of the asset

C.

The monetary value of the asset

D.

The size of the asset's user base

Full Access
Question # 80

When classifying and prioritizing risk responses, the areas to address FIRST are those with:

A.

low cost effectiveness ratios and high risk levels

B.

high cost effectiveness ratios and low risk levels.

C.

high cost effectiveness ratios and high risk levels

D.

low cost effectiveness ratios and low risk levels.

Full Access
Question # 81

Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?

A.

To define effective enterprise IT risk appetite and tolerance levels

B.

To execute the IT risk management strategy in support of business objectives

C.

To establish business-aligned IT risk management organizational structures

D.

To assess the capabilities and maturity of the organization’s IT risk management efforts

Full Access
Question # 82

Which of the following is the MOST important outcome of a business impact analysis (BIA)?

A.

Understanding and prioritization of critical processes

B.

Completion of the business continuity plan (BCP)

C.

Identification of regulatory consequences

D.

Reduction of security and business continuity threats

Full Access
Question # 83

Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?

A.

High percentage of lagging indicators

B.

Nonexistent benchmark analysis

C.

Incomplete documentation for KRI monitoring

D.

Ineffective methods to assess risk

Full Access
Question # 84

Which of the following will BEST help to improve an organization's risk culture?

A.

Maintaining a documented risk register

B.

Establishing a risk awareness program

C.

Rewarding employees for reporting security incidents

D.

Allocating resources for risk remediation

Full Access
Question # 85

Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?

A.

Risk register

B.

Risk scenario

C.

RACI matrix

D.

Risk response plan

Full Access
Question # 86

An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?

A.

Obtain adequate cybersecurity insurance coverage.

B.

Ensure business continuity assessments are up to date.

C.

Adjust the organization's risk appetite and tolerance.

D.

Obtain certification to a global information security standard.

Full Access
Question # 87

Which of the following controls will BEST mitigate risk associated with excessive access privileges?

A.

Review of user access logs

B.

Frequent password expiration

C.

Separation of duties

D.

Entitlement reviews

Full Access
Question # 88

An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?

A.

Develop new key risk indicators (KRIs).

B.

Perform a root cause analysis.

C.

Recommend the purchase of cyber insurance.

D.

Review the incident response plan.

Full Access
Question # 89

Which of the following is the BEST way to validate whether controls to reduce user device vulnerabilities have been implemented according to management's action plan?

A.

Survey device owners.

B.

Rescan the user environment.

C.

Require annual end user policy acceptance.

D.

Review awareness training assessment results

Full Access
Question # 90

Who is MOST important lo include in the assessment of existing IT risk scenarios?

A.

Technology subject matter experts

B.

Business process owners

C.

Business users of IT systems

D.

Risk management consultants

Full Access
Question # 91

The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:

A.

results of a business impact analysis (BIA).

B.

the original risk response plan.

C.

training program and user awareness documentation.

D.

a post-implementation risk and control self-assessment (RCSA).

Full Access
Question # 92

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Assigning a data owner

B.

Scheduling periodic audits

C.

Implementing technical controls over the assets

D.

Implementing a data loss prevention (DLP) solution

Full Access
Question # 93

Which of the following is the MOST important consideration when prioritizing risk response?

A.

Requirements for regulatory obligations.

B.

Cost of control implementation.

C.

Effectiveness of risk treatment.

D.

Number of risk response options.

Full Access
Question # 94

During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?

A.

Insufficient laptops for existing employees

B.

Abuse of leavers' account privileges

C.

Unauthorized access to organizational data

D.

Financial cost of replacing the laptops

Full Access
Question # 95

After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:

A.

prepare a follow-up risk assessment.

B.

recommend acceptance of the risk scenarios.

C.

reconfirm risk tolerance levels.

D.

analyze changes to aggregate risk.

Full Access
Question # 96

Effective risk communication BEST benefits an organization by:

A.

helping personnel make better-informed decisions

B.

assisting the development of a risk register.

C.

improving the effectiveness of IT controls.

D.

increasing participation in the risk assessment process.

Full Access
Question # 97

Which of the following is the MOST essential characteristic of a good IT risk scenario?

A.

The scenario is aligned to business control processes.

B.

The scenario is aligned to the organization’s risk appetite and tolerance.

C.

The scenario is aligned to a business objective.

D.

The scenario is aligned to known vulnerabilities in information technology.

Full Access
Question # 98

When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:

A.

process flow.

B.

business impact analysis (BIA).

C.

service level agreement (SLA).

D.

system architecture.

Full Access
Question # 99

An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?

A.

Business benefits of shadow IT

B.

Application-related expresses

C.

Classification of the data

D.

Volume of data

Full Access
Question # 100

During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?

A.

Escalate the non-cooperation to management

B.

Exclude applicable controls from the assessment.

C.

Review the supplier's contractual obligations.

D.

Request risk acceptance from the business process owner.

Full Access
Question # 101

During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?

A.

Risk management framework adopted by each company

B.

Risk registers of both companies

C.

IT balanced scorecard of each company

D.

Most recent internal audit findings from both companies

Full Access
Question # 102

What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?

A.

Potential loss to tie business due to non-performance of the asset

B.

Known emerging environmental threats

C.

Known vulnerabilities published by the asset developer

D.

Cost of replacing the asset with a new asset providing similar services

Full Access
Question # 103

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

identification.

B.

treatment.

C.

communication.

D.

assessment

Full Access
Question # 104

Which of the following is the MOST cost-effective way to test a business continuity plan?

A.

Conduct interviews with key stakeholders.

B.

Conduct a tabletop exercise.

C.

Conduct a disaster recovery exercise.

D.

Conduct a full functional exercise.

Full Access
Question # 105

Which of the following is the MOST important characteristic of an effective risk management program?

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Full Access
Question # 106

After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk acceptance

D.

Risk transfer

Full Access
Question # 107

A trusted third-party service provider has determined that the risk of a client's systems being hacked is low. Which of the following would be the client's BEST course of action?

A.

Perform their own risk assessment

B.

Implement additional controls to address the risk.

C.

Accept the risk based on the third party's risk assessment

D.

Perform an independent audit of the third party.

Full Access
Question # 108

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Full Access
Question # 109

An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?

A.

Employ security guards.

B.

Conduct security awareness training.

C.

Install security cameras.

D.

Require security access badges.

Full Access
Question # 110

A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?

A.

The underlying data source for the KRI is using inaccurate data and needs to be corrected.

B.

The KRI is not providing useful information and should be removed from the KRI inventory.

C.

The KRI threshold needs to be revised to better align with the organization s risk appetite

D.

Senior management does not understand the KRI and should undergo risk training.

Full Access
Question # 111

The MOST effective way to increase the likelihood that risk responses will be implemented is to:

A.

create an action plan

B.

assign ownership

C.

review progress reports

D.

perform regular audits.

Full Access
Question # 112

The risk associated with an asset before controls are applied can be expressed as:

A.

a function of the likelihood and impact

B.

the magnitude of an impact

C.

a function of the cost and effectiveness of control.

D.

the likelihood of a given threat

Full Access
Question # 113

Which of the following is the MAIN reason to continuously monitor IT-related risk?

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Full Access
Question # 114

Which of the following is the MOST important outcome of reviewing the risk management process?

A.

Assuring the risk profile supports the IT objectives

B.

Improving the competencies of employees who performed the review

C.

Determining what changes should be made to IS policies to reduce risk

D.

Determining that procedures used in risk assessment are appropriate

Full Access
Question # 115

Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?

A.

Digital signatures

B.

Encrypted passwords

C.

One-time passwords

D.

Digital certificates

Full Access
Question # 116

Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?

A.

Percentage of systems included in recovery processes

B.

Number of key systems hosted

C.

Average response time to resolve system incidents

D.

Percentage of system availability

Full Access
Question # 117

A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?

A.

Business continuity manager (BCM)

B.

Human resources manager (HRM)

C.

Chief risk officer (CRO)

D.

Chief information officer (CIO)

Full Access
Question # 118

When reviewing management's IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?

A.

Assess management's risk tolerance.

B.

Recommend management accept the low-risk scenarios.

C.

Propose mitigating controls

D.

Re-evaluate the risk scenarios associated with the control

Full Access
Question # 119

Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?

A.

Several risk action plans have missed target completion dates.

B.

Senior management has accepted more risk than usual.

C.

Risk associated with many assets is only expressed in qualitative terms.

D.

Many risk scenarios are owned by the same senior manager.

Full Access
Question # 120

A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?

A.

implement code reviews and Quality assurance on a regular basis

B.

Verity me software agreement indemnifies the company from losses

C.

Review the source coda and error reporting of the application

D.

Update the software with the latest patches and updates

Full Access
Question # 121

An organization control environment is MOST effective when:

A.

control designs are reviewed periodically

B.

controls perform as intended.

C.

controls are implemented consistently.

D.

controls operate efficiently

Full Access
Question # 122

Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?

A.

Individuals outside IT are managing action plans for the risk scenarios.

B.

Target dates for completion are missing from some action plans.

C.

Senior management approved multiple changes to several action plans.

D.

Many action plans were discontinued after senior management accepted the risk.

Full Access
Question # 123

Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?

A.

Key risk indicator (KRI) thresholds

B.

Inherent risk

C.

Risk likelihood and impact

D.

Risk velocity

Full Access
Question # 124

Risk mitigation procedures should include:

A.

buying an insurance policy.

B.

acceptance of exposures

C.

deployment of counter measures.

D.

enterprise architecture implementation.

Full Access
Question # 125

Which of the following is the BEST method of creating risk awareness in an organization?

A.

Marking the risk register available to project stakeholders

B.

Ensuring senior management commitment to risk training

C.

Providing regular communication to risk managers

D.

Appointing the risk manager from the business units

Full Access
Question # 126

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Implementing a data toss prevention (DLP) solution

B.

Assigning a data owner

C.

Scheduling periodic audits

D.

Implementing technical controls over the assets

Full Access
Question # 127

An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?

A.

Meet with the business leaders to ensure the classification of their transferred data is in place

B.

Ensure the language in the contract explicitly states who is accountable for each step of the data transfer process

C.

Collect requirements for the environment to ensure the infrastructure as a service (IaaS) is configured appropriately.

D.

Work closely with the information security officer to ensure the company has the proper security controls in place.

Full Access
Question # 128

Which of the blowing is MOST important when implementing an organization s security policy?

A.

Obtaining management support

B.

Benchmarking against industry standards

C.

Assessing compliance requirements

D.

Identifying threats and vulnerabilities

Full Access
Question # 129

If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7

A.

Evaluate alternative controls.

B.

Redefine the business process to reduce the risk.

C.

Develop a plan to upgrade technology.

D.

Define a process for monitoring risk.

Full Access
Question # 130

A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?

A.

Request a regulatory risk reporting methodology

B.

Require critical success factors (CSFs) for IT risks.

C.

Establish IT-specific compliance objectives

D.

Communicate IT key risk indicators (KRIs) and triggers

Full Access
Question # 131

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

A.

Balanced scorecard

B.

Capability maturity level

C.

Internal audit plan

D.

Control self-assessment (CSA)

Full Access
Question # 132

The PRIMARY benefit of using a maturity model is that it helps to evaluate the:

A.

capability to implement new processes

B.

evolution of process improvements

C.

degree of compliance with policies and procedures

D.

control requirements.

Full Access
Question # 133

Which type of indicators should be developed to measure the effectiveness of an organization's firewall rule set?

A.

Key risk indicators (KRIs)

B.

Key management indicators (KMIs)

C.

Key performance indicators (KPIs)

D.

Key control indicators (KCIs)

Full Access
Question # 134

Which of the following is the STRONGEST indication an organization has ethics management issues?

A.

Employees do not report IT risk issues for fear of consequences.

B.

Internal IT auditors report to the chief information security officer (CISO).

C.

Employees face sanctions for not signing the organization's acceptable use policy.

D.

The organization has only two lines of defense.

Full Access
Question # 135

All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:

A.

select a provider to standardize the disaster recovery plans.

B.

outsource disaster recovery to an external provider.

C.

centralize the risk response function at the enterprise level.

D.

evaluate opportunities to combine disaster recovery plans.

Full Access
Question # 136

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?

A.

Percentage of job failures identified and resolved during the recovery process

B.

Percentage of processes recovered within the recovery time and point objectives

C.

Number of current test plans and procedures

D.

Number of issues and action items resolved during the recovery test

Full Access
Question # 137

Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?

A.

Fiscal management practices

B.

Business maturity

C.

Budget for implementing security

D.

Management culture

Full Access
Question # 138

Who is the BEST person to the employee personal data?

A.

Human resources (HR) manager

B.

System administrator

C.

Data privacy manager

D.

Compliance manager

Full Access
Question # 139

A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:

A.

risk score

B.

risk impact

C.

risk response

D.

risk likelihood.

Full Access
Question # 140

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

A.

The program has not decreased threat counts.

B.

The program has not considered business impact.

C.

The program has been significantly revised

D.

The program uses non-customized training modules.

Full Access
Question # 141

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.

Prioritizing and addressing risk in line with risk appetite. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

Full Access
Question # 142

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Full Access
Question # 143

An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?

A.

Periodically review application on BYOD devices

B.

Include BYOD in organizational awareness programs

C.

Implement BYOD mobile device management (MDM) controls.

D.

Enable a remote wee capability for BYOD devices

Full Access
Question # 144

A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?

A.

Risk impact

B.

Risk trend

C.

Risk appetite

D.

Risk likelihood

Full Access
Question # 145

Which of the following is the PRIMARY reason for logging in a production database environment?

A.

To provide evidence of activities

B.

To prevent illicit actions of database administrators (DBAs)

C.

To ensure that changes are authorized

D.

To ensure that changes made are correctly applied

Full Access
Question # 146

Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?

A.

Risk and control self-assessment (CSA) reports

B.

Information generated by the systems

C.

Control environment narratives

D.

Confirmation from industry peers

Full Access
Question # 147

Which of the following is the BEST way to identify changes to the risk landscape?

A.

Internal audit reports

B.

Access reviews

C.

Threat modeling

D.

Root cause analysis

Full Access
Question # 148

Reviewing which of the following BEST helps an organization gam insight into its overall risk profile''

A.

Risk register

B.

Risk appetite

C.

Threat landscape

D.

Risk metrics

Full Access
Question # 149

Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?

A.

Reviewing control objectives

B.

Aligning with industry best practices

C.

Consulting risk owners

D.

Evaluating KPIs in accordance with risk appetite

Full Access
Question # 150

When of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk register maintenance?

A.

Remove risk that has been mitigated by third-party transfer

B.

Remove risk that management has decided to accept

C.

Remove risk only following a significant change in the risk environment

D.

Remove risk when mitigation results in residual risk within tolerance levels

Full Access
Question # 151

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

A.

Failure to test the disaster recovery plan (DRP)

B.

Lack of well-documented business impact analysis (BIA)

C.

Lack of annual updates to the disaster recovery plan (DRP)

D.

Significant changes in management personnel

Full Access
Question # 152

Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?

A.

The cloud environment's capability maturity model

B.

The cloud environment's risk register

C.

The cloud computing architecture

D.

The organization's strategic plans for cloud computing

Full Access
Question # 153

Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?

A.

Risk mitigation plans

B.

heat map

C.

Risk appetite statement

D.

Key risk indicators (KRls)

Full Access
Question # 154

An organization's chief information officer (CIO) has proposed investing in a new. untested technology to take advantage of being first to market Senior management has concerns about the success of the project and has set a limit for expenditures before final approval. This conditional approval indicates the organization's risk:

A.

capacity.

B.

appetite.

C.

management capability.

D.

treatment strategy.

Full Access
Question # 155

Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?

A.

Implement user access controls

B.

Perform regular internal audits

C.

Develop and communicate fraud prevention policies

D.

Conduct fraud prevention awareness training.

Full Access
Question # 156

The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:

A.

implement uniform controls for common risk scenarios.

B.

ensure business unit risk is uniformly distributed.

C.

build a risk profile for management review.

D.

quantify the organization's risk appetite.

Full Access
Question # 157

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Full Access
Question # 158

Which process is MOST effective to determine relevance of threats for risk scenarios?

A.

Vulnerability assessment

B.

Business impact analysis (BIA)

C.

Penetration testing

D.

Root cause analysis

Full Access
Question # 159

An insurance company handling sensitive and personal information from its customers receives a large volume of telephone requests and electronic communications daily. Which of the following

is MOST important to include in a risk awareness training session for the customer service department?

A.

Archiving sensitive information

B.

Understanding the incident management process

C.

Identifying social engineering attacks

D.

Understanding the importance of using a secure password

Full Access
Question # 160

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk appetite is decreased.

B.

Inherent risk is increased.

C.

Risk tolerance is decreased.

D.

Residual risk is increased.

Full Access
Question # 161

The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:

A.

identify specific project risk.

B.

obtain a holistic view of IT strategy risk.

C.

understand risk associated with complex processes.

D.

incorporate subject matter expertise.

Full Access
Question # 162

In the three lines of defense model, a PRIMARY objective of the second line is to:

A.

Review and evaluate the risk management program.

B.

Ensure risk and controls are effectively managed.

C.

Implement risk management policies regarding roles and responsibilities.

D.

Act as the owner for any operational risk identified as part of the risk program.

Full Access
Question # 163

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

A.

Cost of offsite backup premises

B.

Cost of downtime due to a disaster

C.

Cost of testing the business continuity plan

D.

Response time of the emergency action plan

Full Access
Question # 164

Which of the following would be of GREATEST concern regarding an organization's asset management?

A.

Lack of a mature records management program

B.

Lack of a dedicated asset management team

C.

Decentralized asset lists

D.

Incomplete asset inventory

Full Access
Question # 165

Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''

A.

Implement role-based access control

B.

Implement a data masking process

C.

Include sanctions in nondisclosure agreements (NDAs)

D.

Install a data loss prevention (DLP) tool

Full Access
Question # 166

Which of the following is MOST important to consider before determining a response to a vulnerability?

A.

The likelihood and impact of threat events

B.

The cost to implement the risk response

C.

Lack of data to measure threat events

D.

Monetary value of the asset

Full Access
Question # 167

A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?

A.

Risk manager

B.

Control owner

C.

Control tester

D.

Risk owner

Full Access
Question # 168

An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?

A.

Security control owners based on control failures

B.

Cyber risk remediation plan owners

C.

Risk owners based on risk impact

D.

Enterprise risk management (ERM) team

Full Access
Question # 169

Which of the following would BEST help to ensure that suspicious network activity is identified?

A.

Analyzing intrusion detection system (IDS) logs

B.

Analyzing server logs

C.

Using a third-party monitoring provider

D.

Coordinating events with appropriate agencies

Full Access
Question # 170

From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

A.

The organization gains assurance it can recover from a disaster

B.

Errors are discovered in the disaster recovery process.

C.

All business-critical systems are successfully tested.

D.

All critical data is recovered within recovery time objectives (RTOs).

Full Access
Question # 171

Which of the following controls would BEST reduce the risk of account compromise?

A.

Enforce password changes.

B.

Enforce multi-factor authentication (MFA).

C.

Enforce role-based authentication.

D.

Enforce password encryption.

Full Access
Question # 172

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

A.

Performing a benchmark analysis and evaluating gaps

B.

Conducting risk assessments and implementing controls

C.

Communicating components of risk and their acceptable levels

D.

Participating in peer reviews and implementing best practices

Full Access
Question # 173

A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

A.

a root cause analysis is required

B.

controls are effective for ensuring continuity

C.

hardware needs to be upgraded

D.

no action is required as there was no impact

Full Access
Question # 174

Which of the following BEST enables the integration of IT risk management across an organization?

A.

Enterprise risk management (ERM) framework

B.

Enterprise-wide risk awareness training

C.

Robust risk reporting practices

D.

Risk management policies

Full Access
Question # 175

An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?

A.

Cloud services risk assessments

B.

The organization's threat model

C.

Access control logs

D.

Multi-factor authentication (MFA) architecture

Full Access
Question # 176

The risk to an organization's reputation due to a recent cybersecurity breach is PRIMARILY considered to be:

A.

financial risk.

B.

data risk.

C.

operational risk.

D.

strategic risk.

Full Access
Question # 177

An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on the organization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?

A.

Obfuscate the customers’ personal information.

B.

Require the business partner to delete personal information following the audit.

C.

Use a secure channel to transmit the files.

D.

Ensure the contract includes provisions for sharing personal information.

Full Access
Question # 178

Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?

A.

Customer notification plans

B.

Capacity management

C.

Access management

D.

Impacts on IT project delivery

Full Access
Question # 179

When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:

A.

business process owners.

B.

representative data sets.

C.

industry benchmark data.

D.

data automation systems.

Full Access
Question # 180

Which of the following is the MOST important factor affecting risk management in an organization?

A.

The risk manager's expertise

B.

Regulatory requirements

C.

Board of directors' expertise

D.

The organization's culture

Full Access
Question # 181

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

A.

Perform annual risk assessments.

B.

Interview process owners.

C.

Review the risk register.

D.

Analyze key performance indicators (KPIs).

Full Access
Question # 182

What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?

A.

Use the severity rating to calculate risk.

B.

Classify the risk scenario as low-probability.

C.

Use the highest likelihood identified by risk management.

D.

Rely on range-based estimates provided by subject-matter experts.

Full Access
Question # 183

Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?

A.

Preventive

B.

Deterrent

C.

Compensating

D.

Detective

Full Access
Question # 184

Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?

A.

Align business objectives to the risk profile.

B.

Assess risk against business objectives

C.

Implement an organization-specific risk taxonomy.

D.

Explain risk details to management.

Full Access
Question # 185

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

A.

plan awareness programs for business managers.

B.

evaluate maturity of the risk management process.

C.

assist in the development of a risk profile.

D.

maintain a risk register based on noncompliance.

Full Access
Question # 186

Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?

A.

The costs associated with mitigation options

B.

The status of identified risk scenarios

C.

The cost-benefit analysis of each risk response

D.

The timeframes for risk response actions

Full Access
Question # 187

Which of the following is MOST helpful when prioritizing action plans for identified risk?

A.

Comparing risk rating against appetite

B.

Obtaining input from business units

C.

Determining cost of controls to mitigate risk

D.

Ranking the risk based on likelihood of occurrence

Full Access
Question # 188

Who is ULTIMATELY accountable for risk treatment?

A.

Risk owner

B.

Enterprise risk management (ERM)

C.

Risk practitioner

D.

Control owner

Full Access
Question # 189

Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?

A.

Solutions for eradicating emerging threats

B.

Cost to mitigate the risk resulting from threats

C.

Indicators for detecting the presence of threatsl)

D.

Source and identity of attackers

Full Access
Question # 190

During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?

A.

Data validation

B.

Identification

C.

Authentication

D.

Data integrity

Full Access
Question # 191

Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?

A.

Percentage of high-risk vulnerabilities missed

B.

Number of high-risk vulnerabilities outstanding

C.

Defined thresholds for high-risk vulnerabilities

D.

Percentage of high-risk vulnerabilities addressed

Full Access
Question # 192

Which of the following will help ensure the elective decision-making of an IT risk management committee?

A.

Key stakeholders are enrolled as members

B.

Approved minutes ate forwarded to senior management

C.

Committee meets at least quarterly

D.

Functional overlap across the business is minimized

Full Access
Question # 193

Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?

A.

Implement a tool to track the development team's deliverables.

B.

Review the software development life cycle.

C.

Involve the development team in planning.

D.

Assign more developers to the project team.

Full Access
Question # 194

Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

A.

Vulnerability and threat analysis

B.

Control remediation planning

C.

User acceptance testing (UAT)

D.

Control self-assessment (CSA)

Full Access
Question # 195

Which of the following is MOST helpful when determining whether a system security control is effective?

A.

Control standard operating procedures

B.

Latest security assessment

C.

Current security threat report

D.

Updated risk register

Full Access
Question # 196

Which of the following would BEST help to ensure that identified risk is efficiently managed?

A.

Reviewing the maturity of the control environment

B.

Regularly monitoring the project plan

C.

Maintaining a key risk indicator for each asset in the risk register

D.

Periodically reviewing controls per the risk treatment plan

Full Access
Question # 197

When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?

A.

Materiality

B.

Confidentiality

C.

Maturity

D.

Transparency

Full Access
Question # 198

Which of the following would be MOST useful when measuring the progress of a risk response action plan?

A.

Percentage of mitigated risk scenarios

B.

Annual loss expectancy (ALE) changes

C.

Resource expenditure against budget

D.

An up-to-date risk register

Full Access
Question # 199

Risk management strategies are PRIMARILY adopted to:

A.

take necessary precautions for claims and losses.

B.

achieve acceptable residual risk levels.

C.

avoid risk for business and IT assets.

D.

achieve compliance with legal requirements.

Full Access
Question # 200

The PRIMARY advantage of implementing an IT risk management framework is the:

A.

establishment of a reliable basis for risk-aware decision making.

B.

compliance with relevant legal and regulatory requirements.

C.

improvement of controls within the organization and minimized losses.

D.

alignment of business goals with IT objectives.

Full Access
Question # 201

A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?

A.

Document the finding in the risk register.

B.

Invoke the incident response plan.

C.

Re-evaluate key risk indicators.

D.

Modify the design of the control.

Full Access
Question # 202

Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?

A.

A robust risk aggregation tool set

B.

Clearly defined roles and responsibilities

C.

A well-established risk management committee

D.

Well-documented and communicated escalation procedures

Full Access
Question # 203

Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:

A.

minimize the number of risk scenarios for risk assessment.

B.

aggregate risk scenarios identified across different business units.

C.

build a threat profile of the organization for management review.

D.

provide a current reference to stakeholders for risk-based decisions.

Full Access
Question # 204

Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?

A.

Risk mitigation budget

B.

Business Impact analysis

C.

Cost-benefit analysis

D.

Return on investment

Full Access
Question # 205

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Full Access
Question # 206

Which of the following is the MOST important consideration when developing an organization's risk taxonomy?

A.

Leading industry frameworks

B.

Business context

C.

Regulatory requirements

D.

IT strategy

Full Access
Question # 207

The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

A.

align with audit results.

B.

benchmark with competitor s actions.

C.

reference best practice.

D.

focus on the business drivers

Full Access
Question # 208

Which of the following is MOST important to identify when developing generic risk scenarios?

A.

The organization’s vision and mission

B.

Resources required for risk mitigation

C.

Impact to business objectives

D.

Risk-related trends within the industry

Full Access
Question # 209

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Developing contingency plans for key processes

B.

Implementing key performance indicators (KPIs)

C.

Adding risk triggers to entries in the risk register

D.

Establishing a series of key risk indicators (KRIs)

Full Access
Question # 210

The PRIMARY objective of testing the effectiveness of a new control before implementation is to:

A.

ensure that risk is mitigated by the control.

B.

measure efficiency of the control process.

C.

confirm control alignment with business objectives.

D.

comply with the organization's policy.

Full Access
Question # 211

An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?

A.

Perform a risk assessment

B.

Disable user access.

C.

Develop an access control policy.

D.

Perform root cause analysis.

Full Access
Question # 212

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

A.

Logs and system events

B.

Intrusion detection system (IDS) rules

C.

Vulnerability assessment reports

D.

Penetration test reports

Full Access
Question # 213

Improvements in the design and implementation of a control will MOST likely result in an update to:

A.

inherent risk.

B.

residual risk.

C.

risk appetite

D.

risk tolerance

Full Access
Question # 214

The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?

A.

Perform a root cause analysis

B.

Perform a code review

C.

Implement version control software.

D.

Implement training on coding best practices

Full Access
Question # 215

Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?

A.

Emphasizing risk in the risk profile that is related to critical business activities

B.

Customizing the presentation of the risk profile to the intended audience

C.

Including details of risk with high deviation from the risk appetite

D.

Providing information on the efficiency of controls for risk mitigation

Full Access
Question # 216

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

A.

Key risk indicators (KRls)

B.

Inherent risk

C.

Residual risk

D.

Risk appetite

Full Access
Question # 217

Which of the following would BEST provide early warning of a high-risk condition?

A.

Risk register

B.

Risk assessment

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

Full Access
Question # 218

Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?

A.

Inherent risk and likelihood

B.

Management action plans associated with audit findings

C.

Residual risk relative to appetite and tolerance

D.

Key risk indicator (KRI) trends

Full Access
Question # 219

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Full Access
Question # 220

Which of the following is MOST important when developing key performance indicators (KPIs)?

A.

Alignment to risk responses

B.

Alignment to management reports

C.

Alerts when risk thresholds are reached

D.

Identification of trends

Full Access
Question # 221

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Full Access
Question # 222

It is MOST appropriate for changes to be promoted to production after they are:

A.

communicated to business management

B.

tested by business owners.

C.

approved by the business owner.

D.

initiated by business users.

Full Access
Question # 223

Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?

A.

The number of security incidents escalated to senior management

B.

The number of resolved security incidents

C.

The number of newly identified security incidents

D.

The number of recurring security incidents

Full Access
Question # 224

A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?

A.

The percentage of systems meeting recovery target times has increased.

B.

The number of systems tested in the last year has increased.

C.

The number of systems requiring a recovery plan has increased.

D.

The percentage of systems with long recovery target times has decreased.

Full Access
Question # 225

A contract associated with a cloud service provider MUST include:

A.

ownership of responsibilities.

B.

a business recovery plan.

C.

provision for source code escrow.

D.

the providers financial statements.

Full Access
Question # 226

Which of the following would BEST ensure that identified risk scenarios are addressed?

A.

Reviewing the implementation of the risk response

B.

Creating a separate risk register for key business units

C.

Performing real-time monitoring of threats

D.

Performing regular risk control self-assessments

Full Access
Question # 227

A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:

A.

management.

B.

tolerance.

C.

culture.

D.

analysis.

Full Access
Question # 228

Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?

A.

Evaluating the impact to control objectives

B.

Conducting a root cause analysis

C.

Validating the adequacy of current processes

D.

Reconfiguring the IT infrastructure

Full Access
Question # 229

An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?

A.

Risk owner

B.

IT security manager

C.

IT system owner

D.

Control owner

Full Access
Question # 230

Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?

A.

Customized regional training on local laws and regulations

B.

Policies requiring central reporting of potential procedure exceptions

C.

Ongoing awareness training to support a common risk culture

D.

Zero-tolerance policies for risk taking by middle-level managers

Full Access
Question # 231

Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?

A.

Perform a post-implementation review.

B.

Conduct user acceptance testing.

C.

Review the key performance indicators (KPIs).

D.

Interview process owners.

Full Access
Question # 232

The PRIMARY benefit associated with key risk indicators (KRls) is that they:

A.

help an organization identify emerging threats.

B.

benchmark the organization's risk profile.

C.

identify trends in the organization's vulnerabilities.

D.

enable ongoing monitoring of emerging risk.

Full Access
Question # 233

Which of the following provides the MOST useful information when determining if a specific control should be implemented?

A.

Business impact analysis (BIA)

B.

Cost-benefit analysis

C.

Attribute analysis

D.

Root cause analysis

Full Access
Question # 234

The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:

A.

develop a comprehensive risk mitigation strategy

B.

develop understandable and realistic risk scenarios

C.

identify root causes for relevant events

D.

perform an aggregated cost-benefit analysis

Full Access
Question # 235

While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:

A.

review and update the policies to align with industry standards.

B.

determine that the policies should be updated annually.

C.

report that the policies are adequate and do not need to be updated frequently.

D.

review the policies against current needs to determine adequacy.

Full Access
Question # 236

Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?

A.

Key risk indicators (KRIs)

B.

Risk scenarios

C.

Business impact analysis (BIA)

D.

Threat analysis

Full Access
Question # 237

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

A.

Organizational reporting process

B.

Incident reporting procedures

C.

Regularly scheduled audits

D.

Incident management policy

Full Access
Question # 238

Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization's risk profile?

A.

Control identification and mitigation

B.

Adoption of a compliance-based approach

C.

Prevention and detection techniques

D.

Scenario analysis and stress testing

Full Access
Question # 239

When of the following provides the MOST tenable evidence that a business process control is effective?

A.

Demonstration that the control is operating as designed

B.

A successful walk-through of the associated risk assessment

C.

Management attestation that the control is operating effectively

D.

Automated data indicating that risk has been reduced

Full Access
Question # 240

The PRIMARY purpose of IT control status reporting is to:

A.

ensure compliance with IT governance strategy.

B.

assist internal audit in evaluating and initiating remediation efforts.

C.

benchmark IT controls with Industry standards.

D.

facilitate the comparison of the current and desired states.

Full Access
Question # 241

Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?

A.

Time required for backup restoration testing

B.

Change in size of data backed up

C.

Successful completion of backup operations

D.

Percentage of failed restore tests

Full Access
Question # 242

Which of the following is the PRIMARY role of a data custodian in the risk management process?

A.

Performing periodic data reviews according to policy

B.

Reporting and escalating data breaches to senior management

C.

Being accountable for control design

D.

Ensuring data is protected according to the classification

Full Access
Question # 243

A risk practitioner has been asked to advise management on developing a log collection and correlation strategy. Which of the following should be the MOST important consideration when developing this strategy?

A.

Ensuring time synchronization of log sources.

B.

Ensuring the inclusion of external threat intelligence log sources.

C.

Ensuring the inclusion of all computing resources as log sources.

D.

Ensuring read-write access to all log sources

Full Access
Question # 244

Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?

A.

Number of projects going live without a security review

B.

Number of employees completing project-specific security training

C.

Number of security projects started in core departments

D.

Number of security-related status reports submitted by project managers

Full Access
Question # 245

A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?

A.

Sensitivity of the data

B.

Readability of test data

C.

Security of the test environment

D.

Availability of data to authorized staff

Full Access
Question # 246

Which of the following should be determined FIRST when a new security vulnerability is made public?

A.

Whether the affected technology is used within the organization

B.

Whether the affected technology is Internet-facing

C.

What mitigating controls are currently in place

D.

How pervasive the vulnerability is within the organization

Full Access
Question # 247

When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?

A.

An analysis of the security logs that illustrate the sequence of events

B.

An analysis of the impact of similar attacks in other organizations

C.

A business case for implementing stronger logical access controls

D.

A justification of corrective action taken

Full Access
Question # 248

Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?

A.

Regulatory compliance

B.

Risk ownership

C.

Best practices

D.

Desired risk level

Full Access
Question # 249

To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:

A.

require the vendor to sign a nondisclosure agreement

B.

clearly define the project scope.

C.

perform background checks on the vendor.

D.

notify network administrators before testing

Full Access
Question # 250

Which of the following approaches BEST identifies information systems control deficiencies?

A.

Countermeasures analysis

B.

Best practice assessment

C.

Gap analysis

D.

Risk assessment

Full Access
Question # 251

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

A.

Percentage of business users completing risk training

B.

Percentage of high-risk scenarios for which risk action plans have been developed

C.

Number of key risk indicators (KRIs) defined

D.

Time between when IT risk scenarios are identified and the enterprise's response

Full Access
Question # 252

An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:

A.

data aggregation

B.

data privacy

C.

data quality

D.

data validation

Full Access
Question # 253

Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?

A.

Evaluate the security architecture maturity.

B.

Map the new requirements to the existing control framework.

C.

Charter a privacy steering committee.

D.

Conduct a privacy impact assessment (PIA).

Full Access
Question # 254

Which of the following controls BEST enables an organization to ensure a complete and accurate IT asset inventory?

A.

Prohibiting the use of personal devices for business

B.

Performing network scanning for unknown devices

C.

Requesting an asset list from business owners

D.

Documenting asset configuration baselines

Full Access
Question # 255

Which of the following is MOST useful when communicating risk to management?

A.

Risk policy

B.

Audit report

C.

Risk map

D.

Maturity model

Full Access
Question # 256

Which of the following provides the BEST evidence that a selected risk treatment plan is effective?

A.

Identifying key risk indicators (KRIs)

B.

Evaluating the return on investment (ROI)

C.

Evaluating the residual risk level

D.

Performing a cost-benefit analysis

Full Access
Question # 257

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

A.

Evaluating risk impact

B.

Establishing key performance indicators (KPIs)

C.

Conducting internal audits

D.

Creating quarterly risk reports

Full Access
Question # 258

Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:

A.

inquire about the status of any planned corrective actions

B.

keep monitoring the situation as there is evidence that this is normal

C.

adjust the risk threshold to better reflect actual performance

D.

initiate corrective action to address the known deficiency

Full Access
Question # 259

Vulnerabilities have been detected on an organization's systems. Applications installed on these systems will not operate if the underlying servers are updated. Which of the following is the risk practitioner's BEST course of action?

A.

Recommend the business change the application.

B.

Recommend a risk treatment plan.

C.

Include the risk in the next quarterly update to management.

D.

Implement compensating controls.

Full Access
Question # 260

The MOST important objective of information security controls is to:

A.

Identify threats and vulnerability

B.

Ensure alignment with industry standards

C.

Provide measurable risk reduction

D.

Enforce strong security solutions

Full Access
Question # 261

A risk practitioner has discovered a deficiency in a critical system that cannot be patched. Which of the following should be the risk practitioner's FIRST course of action?

A.

Report the issue to internal audit.

B.

Submit a request to change management.

C.

Conduct a risk assessment.

D.

Review the business impact assessment.

Full Access
Question # 262

Which of the following BEST facilitates the mitigation of identified gaps between current and desired risk environment states?

A.

Develop a risk treatment plan.

B.

Validate organizational risk appetite.

C.

Review results of prior risk assessments.

D.

Include the current and desired states in the risk register.

Full Access
Question # 263

Which of the following is MOST important to the integrity of a security log?

A.

Least privilege access

B.

Inability to edit

C.

Ability to overwrite

D.

Encryption

Full Access
Question # 264

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?

A.

To measure business exposure to risk

B.

To identify control vulnerabilities

C.

To monitor the achievement of set objectives

D.

To raise awareness of operational issues

Full Access
Question # 265

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.

Insurance coverage

B.

Security awareness training

C.

Policies and standards

D.

Risk appetite and tolerance

Full Access
Question # 266

Establishing and organizational code of conduct is an example of which type of control?

A.

Preventive

B.

Directive

C.

Detective

D.

Compensating

Full Access
Question # 267

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

A.

Relevance to the business process

B.

Regulatory compliance requirements

C.

Cost-benefit analysis

D.

Comparison against best practice

Full Access
Question # 268

Which of the following is the BEST reason to use qualitative measures to express residual risk levels related to emerging threats?

A.

Qualitative measures require less ongoing monitoring.

B.

Qualitative measures are better aligned to regulatory requirements.

C.

Qualitative measures are better able to incorporate expert judgment.

D.

Qualitative measures are easier to update.

Full Access
Question # 269

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

A.

Cost of controls

B.

Risk tolerance

C.

Risk appetite

D.

Probability definition

Full Access
Question # 270

The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:

A.

the proposed controls are implemented as scheduled.

B.

security controls are tested prior to implementation.

C.

compliance with corporate policies.

D.

the risk response strategy has been decided.

Full Access
Question # 271

What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?

A.

Risk impact

B.

Risk likelihood

C.

Risk appropriate

D.

Control self-assessments (CSAs)

Full Access
Question # 272

When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?

A.

Acceptance

B.

Mitigation

C.

Transfer

D.

Avoidance

Full Access
Question # 273

Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?

A.

Informed consent

B.

Cross border controls

C.

Business impact analysis (BIA)

D.

Data breach protection

Full Access
Question # 274

Which of the following BEST indicates that additional or improved controls ate needed m the environment?

A.

Management, has decreased organisational risk appetite

B.

The risk register and portfolio do not include all risk scenarios

C.

merging risk scenarios have been identified

D.

Risk events and losses exceed risk tolerance

Full Access
Question # 275

Which of the following methods is an example of risk mitigation?

A.

Not providing capability for employees to work remotely

B.

Outsourcing the IT activities and infrastructure

C.

Enforcing change and configuration management processes

D.

Taking out insurance coverage for IT-related incidents

Full Access
Question # 276

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

A.

Monitoring risk responses

B.

Applying risk treatments

C.

Providing assurance of control effectiveness

D.

Implementing internal controls

Full Access
Question # 277

An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner's BEST recommendation?

A.

Implement database activity and capacity monitoring.

B.

Ensure the business is aware of the risk.

C.

Ensure the enterprise has a process to detect such situations.

D.

Consider providing additional system resources to this job.

Full Access
Question # 278

A service provider is managing a client’s servers. During an audit of the service, a noncompliant control is discovered that will not be resolved before the next audit because the client cannot afford the downtime required to correct the issue. The service provider’s MOST appropriate action would be to:

A.

develop a risk remediation plan overriding the client's decision

B.

make a note for this item in the next audit explaining the situation

C.

insist that the remediation occur for the benefit of other customers

D.

ask the client to document the formal risk acceptance for the provider

Full Access
Question # 279

Which of the following BEST indicates the efficiency of a process for granting access privileges?

A.

Average time to grant access privileges

B.

Number of changes in access granted to users

C.

Average number of access privilege exceptions

D.

Number and type of locked obsolete accounts

Full Access
Question # 280

Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?

A.

Perform a gap analysis.

B.

Prioritize impact to the business units.

C.

Perform a risk assessment.

D.

Review the risk tolerance and appetite.

Full Access
Question # 281

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

A.

Approval by senior management

B.

Low cost of development and maintenance

C.

Sensitivity to changes in risk levels

D.

Use of industry risk data sources

Full Access
Question # 282

An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:

A.

reduce the likelihood of future events

B.

restore availability

C.

reduce the impact of future events

D.

address the root cause

Full Access
Question # 283

When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?

A.

BCP testing is net in conjunction with the disaster recovery plan (DRP)

B.

Recovery time objectives (RTOs) do not meet business requirements.

C.

BCP is often tested using the walk-through method.

D.

Each business location has separate, inconsistent BCPs.

Full Access
Question # 284

Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:

A.

is in charge of information security.

B.

is responsible for enterprise risk management (ERM)

C.

can implement remediation action plans.

D.

is accountable for loss if the risk materializes.

Full Access
Question # 285

An organization's risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?

A.

Analyzing the residual risk components

B.

Performing risk prioritization

C.

Validating the risk appetite level

D.

Conducting a risk assessment

Full Access
Question # 286

Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?

A.

Device corruption

B.

Data loss

C.

Malicious users

D.

User support

Full Access
Question # 287

An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?

A.

Audit reports

B.

Industry benchmarks

C.

Financial forecasts

D.

Annual threat reports

Full Access
Question # 288

Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization's:

A.

risk classification methods

B.

risk-based capital allocation

C.

risk portfolio

D.

risk culture

Full Access
Question # 289

A risk practitioner is preparing a report to communicate changes in the risk and control environment. The BEST way to engage stakeholder attention is to:

A.

include detailed deviations from industry benchmarks,

B.

include a summary linking information to stakeholder needs,

C.

include a roadmap to achieve operational excellence,

D.

publish the report on-demand for stakeholders.

Full Access
Question # 290

Which of the following should be included in a risk scenario to be used for risk analysis?

A.

Risk appetite

B.

Threat type

C.

Risk tolerance

D.

Residual risk

Full Access
Question # 291

The MOST important consideration when selecting a control to mitigate an identified risk is whether:

A.

the cost of control exceeds the mitigation value

B.

there are sufficient internal resources to implement the control

C.

the mitigation measures create compounding effects

D.

the control eliminates the risk

Full Access
Question # 292

Which of the following trends would cause the GREATEST concern regarding the effectiveness of an organization's user access control processes? An increase in the:

A.

ratio of disabled to active user accounts.

B.

percentage of users with multiple user accounts.

C.

average number of access entitlements per user account.

D.

average time between user transfers and access updates.

Full Access
Question # 293

Which of the following is the BEST way to manage the risk associated with malicious activities performed by database administrators (DBAs)?

A.

Activity logging and monitoring

B.

Periodic access review

C.

Two-factor authentication

D.

Awareness training and background checks

Full Access
Question # 294

Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?

A.

User acceptance testing (UAT)

B.

Database activity monitoring

C.

Source code review

D.

Vulnerability analysis

Full Access
Question # 295

Which of the following should be the PRIMARY basis for prioritizing risk responses?

A.

The impact of the risk

B.

The replacement cost of the business asset

C.

The cost of risk mitigation controls

D.

The classification of the business asset

Full Access
Question # 296

Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors

A.

Frequency of business continuity plan (BCP) lasting

B.

Frequency and number of new software releases

C.

Frequency and duration of unplanned downtime

D.

Number of IT support staff available after business hours

Full Access
Question # 297

Which of the following is a PRIMARY reason for considering existing controls during initial risk assessment?

A.

To determine the inherent risk level

B.

To determine the acceptable risk level

C.

To determine the current risk level

D.

To determine the desired risk level

Full Access
Question # 298

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?

A.

Ask the business to make a budget request to remediate the problem.

B.

Build a business case to remediate the fix.

C.

Research the types of attacks the threat can present.

D.

Determine the impact of the missing threat.

Full Access
Question # 299

The BEST reason to classify IT assets during a risk assessment is to determine the:

A.

priority in the risk register.

B.

business process owner.

C.

enterprise risk profile.

D.

appropriate level of protection.

Full Access
Question # 300

Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:

A.

a threat.

B.

a vulnerability.

C.

an impact

D.

a control.

Full Access
Question # 301

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

A.

Vulnerability scanning

B.

Systems log correlation analysis

C.

Penetration testing

D.

Monitoring of intrusion detection system (IDS) alerts

Full Access
Question # 302

Which of The following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?

A.

Business continuity plan (BCP) testing results

B.

Recovery lime objective (RTO)

C.

Business impact analysis (BIA)

D.

results Recovery point objective (RPO)

Full Access
Question # 303

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

A.

Segregation of duties

B.

Three lines of defense

C.

Compliance review

D.

Quality assurance review

Full Access
Question # 304

Which of the following BEST supports the management of identified risk scenarios?

A.

Collecting risk event data

B.

Maintaining a risk register

C.

Using key risk indicators (KRIs)

D.

Defining risk parameters

Full Access
Question # 305

Which of the following should be the PRIMARY goal of developing information security metrics?

A.

Raising security awareness

B.

Enabling continuous improvement

C.

Identifying security threats

D.

Ensuring regulatory compliance

Full Access
Question # 306

The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:

A.

changes due to emergencies.

B.

changes that cause incidents.

C.

changes not requiring user acceptance testing.

D.

personnel that have rights to make changes in production.

Full Access
Question # 307

Which of the following will BEST support management reporting on risk?

A.

Control self-assessment (CSA)

B.

Risk policy requirements

C.

A risk register

D.

Key performance indicators (KPIs)

Full Access
Question # 308

Which of the following MUST be updated to maintain an IT risk register?

A.

Expected frequency and potential impact

B.

Risk tolerance

C.

Enterprise-wide IT risk assessment

D.

Risk appetite

Full Access
Question # 309

The MAJOR reason to classify information assets is

A.

maintain a current inventory and catalog of information assets

B.

determine their sensitivity and critical

C.

establish recovery time objectives (RTOs)

D.

categorize data into groups

Full Access
Question # 310

Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application'?

A.

The third-party risk manager

B.

The application vendor

C.

The business process owner

D.

The information security manager

Full Access
Question # 311

Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?

A.

Data classification policy

B.

Emerging technology trends

C.

The IT strategic plan

D.

The risk register

Full Access
Question # 312

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.

Control owner

B.

Risk owner

C.

Internal auditor

D.

Compliance manager

Full Access
Question # 313

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs provide an early warning that a risk threshold is about to be reached.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization.

D.

KRIs assist in the preparation of the organization's risk profile.

Full Access
Question # 314

The BEST key performance indicator (KPI) to measure the effectiveness of the security patching process is the percentage of patches installed:

A.

by the security administration team.

B.

successfully within the expected time frame.

C.

successfully during the first attempt.

D.

without causing an unplanned system outage.

Full Access
Question # 315

Which of the following would BEST mitigate an identified risk scenario?

A.

Conducting awareness training

B.

Executing a risk response plan

C.

Establishing an organization's risk tolerance

D.

Performing periodic audits

Full Access
Question # 316

Which of the following is the result of a realized risk scenario?

A.

Technical event

B.

Threat event

C.

Vulnerability event

D.

Loss event

Full Access
Question # 317

Which of the following has the GREATEST influence on an organization's risk appetite?

A.

Threats and vulnerabilities

B.

Internal and external risk factors

C.

Business objectives and strategies

D.

Management culture and behavior

Full Access
Question # 318

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 319

One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?

A.

Additional mitigating controls should be identified.

B.

The system should not be used until the application is changed

C.

The organization's IT risk appetite should be adjusted.

D.

The associated IT risk should be accepted by management.

Full Access
Question # 320

Well-developed, data-driven risk measurements should be:

A.

reflective of the lowest organizational level.

B.

a data feed taken directly from operational production systems.

C.

reported to management the same day data is collected.

D.

focused on providing a forward-looking view.

Full Access
Question # 321

The PRIMARY focus of an ongoing risk awareness program should be to:

A.

enable better risk-based decisions.

B.

define appropriate controls to mitigate risk.

C.

determine impact of risk scenarios.

D.

expand understanding of risk indicators.

Full Access
Question # 322

Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?

A.

Perform an audit.

B.

Conduct a risk analysis.

C.

Develop risk scenarios.

D.

Perform a cost-benefit analysis.

Full Access
Question # 323

Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?

A.

Service level agreement (SLA)

B.

Critical success factor (CSF)

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

Full Access
Question # 324

Who should be accountable for authorizing information system access to internal users?

A.

Information security officer

B.

Information security manager

C.

Information custodian

D.

Information owner

Full Access
Question # 325

Who is the BEST person to an application system used to process employee personal data?

A.

Compliance manager

B.

Data privacy manager

C.

System administrator

D.

Human resources (HR) manager

Full Access
Question # 326

Which of the following controls will BEST detect unauthorized modification of data by a database administrator?

A.

Reviewing database access rights

B.

Reviewing database activity logs

C.

Comparing data to input records

D.

Reviewing changes to edit checks

Full Access
Question # 327

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?

A.

Better understanding of the risk appetite

B.

Improving audit results

C.

Enabling risk-based decision making

D.

Increasing process control efficiencies

Full Access
Question # 328

Which of the following would BEST help an enterprise prioritize risk scenarios?

A.

Industry best practices

B.

Placement on the risk map

C.

Degree of variances in the risk

D.

Cost of risk mitigation

Full Access
Question # 329

Which of the following should be the PRIMARY input when designing IT controls?

A.

Benchmark of industry standards

B.

Internal and external risk reports

C.

Recommendations from IT risk experts

D.

Outcome of control self-assessments

Full Access
Question # 330

Which of the following is the MOST important benefit of key risk indicators (KRIs)'

A.

Assisting in continually optimizing risk governance

B.

Enabling the documentation and analysis of trends

C.

Ensuring compliance with regulatory requirements

D.

Providing an early warning to take proactive actions

Full Access
Question # 331

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

A.

reduces risk to an acceptable level

B.

quantifies risk impact

C.

aligns with business strategy

D.

advances business objectives.

Full Access
Question # 332

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

A.

Service level agreement

B.

Customer service reviews

C.

Scope of services provided

D.

Right to audit the provider

Full Access
Question # 333

IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would

be MOST helpful?

A.

IT risk register

B.

List of key risk indicators

C.

Internal audit reports

D.

List of approved projects

Full Access
Question # 334

Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?

A.

Optimize the control environment.

B.

Realign risk appetite to the current risk level.

C.

Decrease the number of related risk scenarios.

D.

Reduce the risk management budget.

Full Access
Question # 335

Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?

A.

impact due to failure of control

B.

Frequency of failure of control

C.

Contingency plan for residual risk

D.

Cost-benefit analysis of automation

Full Access
Question # 336

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk tolerance is decreased.

B.

Residual risk is increased.

C.

Inherent risk is increased.

D.

Risk appetite is decreased

Full Access
Question # 337

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

A.

requirements of management.

B.

specific risk analysis framework being used.

C.

organizational risk tolerance

D.

results of the risk assessment.

Full Access
Question # 338

The MOST important characteristic of an organization s policies is to reflect the organization's:

A.

risk assessment methodology.

B.

risk appetite.

C.

capabilities

D.

asset value.

Full Access
Question # 339

Which of the following roles would provide the MOST important input when identifying IT risk scenarios?

A.

Information security managers

B.

Internal auditors

C.

Business process owners

D.

Operational risk managers

Full Access
Question # 340

Which of the following is the BEST method to identify unnecessary controls?

A.

Evaluating the impact of removing existing controls

B.

Evaluating existing controls against audit requirements

C.

Reviewing system functionalities associated with business processes

D.

Monitoring existing key risk indicators (KRIs)

Full Access
Question # 341

Which of the following provides the BEST evidence of the effectiveness of an organization's account provisioning process?

A.

User provisioning

B.

Role-based access controls

C.

Security log monitoring

D.

Entitlement reviews

Full Access
Question # 342

Which of the following BEST enables effective risk-based decision making?

A.

Performing threat modeling to understand the threat landscape

B.

Minimizing the number of risk scenarios for risk assessment

C.

Aggregating risk scenarios across a key business unit

D.

Ensuring the risk register is updated to reflect changes in risk factors

Full Access
Question # 343

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

A.

Risk questionnaire

B.

Risk register

C.

Management assertion

D.

Compliance manual

Full Access
Question # 344

The PRIMARY reason for a risk practitioner to review business processes is to:

A.

Benchmark against peer organizations.

B.

Identify appropriate controls within business processes.

C.

Assess compliance with global standards.

D.

Identify risk owners related to business processes.

Full Access
Question # 345

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Full Access
Question # 346

A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?

A.

An increase in attempted distributed denial of service (DDoS) attacks

B.

An increase in attempted website phishing attacks

C.

A decrease in achievement of service level agreements (SLAs)

D.

A decrease in remediated web security vulnerabilities

Full Access
Question # 347

The PRIMARY objective for selecting risk response options is to:

A.

reduce risk 10 an acceptable level.

B.

identify compensating controls.

C.

minimize residual risk.

D.

reduce risk factors.

Full Access
Question # 348

Which of the following is MOST effective against external threats to an organizations confidential information?

A.

Single sign-on

B.

Data integrity checking

C.

Strong authentication

D.

Intrusion detection system

Full Access
Question # 349

Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?

A.

Testing the transmission of credit card numbers

B.

Reviewing logs for unauthorized data transfers

C.

Configuring the DLP control to block credit card numbers

D.

Testing the DLP rule change control process

Full Access
Question # 350

Which of the following is the MOST effective key performance indicator (KPI) for change management?

A.

Percentage of changes with a fallback plan

B.

Number of changes implemented

C.

Percentage of successful changes

D.

Average time required to implement a change

Full Access
Question # 351

Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?

A.

Senior management has approved the control design.

B.

Inherent risk has been reduced from original levels.

C.

Residual risk remains within acceptable levels.

D.

Costs for control maintenance are reasonable.

Full Access
Question # 352

The PRIMARY reason for prioritizing risk scenarios is to:

A.

provide an enterprise-wide view of risk

B.

support risk response tracking

C.

assign risk ownership

D.

facilitate risk response decisions.

Full Access
Question # 353

An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:

A.

identify key risk indicators (KRls) for ongoing monitoring

B.

validate the CTO's decision with the business process owner

C.

update the risk register with the selected risk response

D.

recommend that the CTO revisit the risk acceptance decision.

Full Access
Question # 354

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

A.

The value at which control effectiveness would fail

B.

Thresholds benchmarked to peer organizations

C.

A typical operational value

D.

A value that represents the intended control state

Full Access
Question # 355

Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?

A.

Control self-assessment (CSA)

B.

Security information and event management (SIEM) solutions

C.

Data privacy impact assessment (DPIA)

D.

Data loss prevention (DLP) tools

Full Access
Question # 356

Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?

A.

Costs and benefits

B.

Local laws and regulations

C.

Security features and support

D.

Business strategies and needs

Full Access
Question # 357

Which of the following is MOST important for an organization to consider when developing its IT strategy?

A.

IT goals and objectives

B.

Organizational goals and objectives

C.

The organization's risk appetite statement

D.

Legal and regulatory requirements

Full Access
Question # 358

Which of the following is the MOST important consideration for effectively maintaining a risk register?

A.

An IT owner is assigned for each risk scenario.

B.

The register is updated frequently.

C.

The register is shared with executive management.

D.

Compensating controls are identified.

Full Access
Question # 359

Which of the following presents the GREATEST challenge to managing an organization's end-user devices?

A.

Incomplete end-user device inventory

B.

Unsupported end-user applications

C.

Incompatible end-user devices

D.

Multiple end-user device models

Full Access
Question # 360

An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?

A.

Nondisclosure agreements (NDAs)

B.

Data anonymization

C.

Data cleansing

D.

Data encryption

Full Access
Question # 361

Which of the following is the GREATEST benefit of identifying appropriate risk owners?

A.

Accountability is established for risk treatment decisions

B.

Stakeholders are consulted about risk treatment options

C.

Risk owners are informed of risk treatment options

D.

Responsibility is established for risk treatment decisions.

Full Access
Question # 362

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

A.

data logging and monitoring

B.

data mining and analytics

C.

data classification and labeling

D.

data retention and destruction

Full Access
Question # 363

When evaluating a number of potential controls for treating risk, it is MOST important to consider:

A.

risk appetite and control efficiency.

B.

inherent risk and control effectiveness.

C.

residual risk and cost of control.

D.

risk tolerance and control complexity.

Full Access
Question # 364

Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?

A.

Well documented policies and procedures

B.

Risk and issue tracking

C.

An IT strategy committee

D.

Change and release management

Full Access
Question # 365

Which of the following provides the MOST reliable evidence of a control's effectiveness?

A.

A risk and control self-assessment

B.

Senior management's attestation

C.

A system-generated testing report

D.

detailed process walk-through

Full Access
Question # 366

Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

A.

possible risk and suggested mitigation plans.

B.

design of controls to encrypt the data to be shared.

C.

project plan for classification of the data.

D.

summary of data protection and privacy legislation.

Full Access
Question # 367

When is the BEST to identify risk associated with major project to determine a mitigation plan?

A.

Project execution phase

B.

Project initiation phase

C.

Project closing phase

D.

Project planning phase

Full Access
Question # 368

Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?

A.

The report was provided directly from the vendor.

B.

The risk associated with multiple control gaps was accepted.

C.

The control owners disagreed with the auditor's recommendations.

D.

The controls had recurring noncompliance.

Full Access
Question # 369

Which of the following is the GREATEST benefit of a three lines of defense structure?

A.

An effective risk culture that empowers employees to report risk

B.

Effective segregation of duties to prevent internal fraud

C.

Clear accountability for risk management processes

D.

Improved effectiveness and efficiency of business operations

Full Access
Question # 370

A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?

A.

Define information retention requirements and policies

B.

Provide information security awareness training

C.

Establish security management processes and procedures

D.

Establish an inventory of information assets

Full Access
Question # 371

What is the MAIN benefit of using a top-down approach to develop risk scenarios?

A.

It describes risk events specific to technology used by the enterprise.

B.

It establishes the relationship between risk events and organizational objectives.

C.

It uses hypothetical and generic risk events specific to the enterprise.

D.

It helps management and the risk practitioner to refine risk scenarios.

Full Access
Question # 372

Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?

A.

Apply data classification policy

B.

Utilize encryption with logical access controls

C.

Require logical separation of company data

D.

Obtain the right to audit

Full Access
Question # 373

Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?

A.

Internal auditor

B.

Asset owner

C.

Finance manager

D.

Control owner

Full Access
Question # 374

Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

A.

To provide input to the organization's risk appetite

B.

To monitor the vendor's control effectiveness

C.

To verify the vendor's ongoing financial viability

D.

To assess the vendor's risk mitigation plans

Full Access
Question # 375

Risk appetite should be PRIMARILY driven by which of the following?

A.

Enterprise security architecture roadmap

B.

Stakeholder requirements

C.

Legal and regulatory requirements

D.

Business impact analysis (BIA)

Full Access
Question # 376

Which of the following is MOST important to update when an organization's risk appetite changes?

A.

Key risk indicators (KRIs)

B.

Risk reporting methodology

C.

Key performance indicators (KPIs)

D.

Risk taxonomy

Full Access
Question # 377

Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?

A.

The number of stakeholders involved in IT risk identification workshops

B.

The percentage of corporate budget allocated to IT risk activities

C.

The percentage of incidents presented to the board

D.

The number of executives attending IT security awareness training

Full Access
Question # 378

Which of the following sources is MOST relevant to reference when updating security awareness training materials?

A.

Risk management framework

B.

Risk register

C.

Global security standards

D.

Recent security incidents reported by competitors

Full Access
Question # 379

A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?

A.

Determine whether risk responses are still adequate.

B.

Analyze and update control assessments with the new processes.

C.

Analyze the risk and update the risk register as needed.

D.

Conduct testing of the control that mitigate the existing risk.

Full Access
Question # 380

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

A.

The volume of risk scenarios is too large

B.

Risk aggregation has not been completed

C.

Risk scenarios are not applicable

D.

The risk analysts for each scenario is incomplete

Full Access
Question # 381

An organization is considering adopting artificial intelligence (AI). Which of the

following is the risk practitioner's MOST important course of action?

A.

Develop key risk indicators (KRIs).

B.

Ensure sufficient pre-implementation testing.

C.

Identify applicable risk scenarios.

D.

Identify the organization's critical data.

Full Access
Question # 382

Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?

A.

Identify any new business objectives with stakeholders.

B.

Present a business case for new controls to stakeholders.

C.

Revise the organization's risk and control policy.

D.

Review existing risk scenarios with stakeholders.

Full Access
Question # 383

Before implementing instant messaging within an organization using a public solution, which of the following should be in place to mitigate data leakage risk?

A.

A data extraction tool

B.

An access control list

C.

An intrusion detection system (IDS)

D.

An acceptable usage policy

Full Access
Question # 384

The annualized loss expectancy (ALE) method of risk analysis:

A.

helps in calculating the expected cost of controls

B.

uses qualitative risk rankings such as low. medium and high.

C.

can be used m a cost-benefit analysts

D.

can be used to determine the indirect business impact.

Full Access
Question # 385

Which of the following indicates an organization follows IT risk management best practice?

A.

The risk register template uses an industry standard.

B.

The risk register is regularly updated.

C.

All fields in the risk register have been completed.

D.

Controls are listed against risk entries in the register.

Full Access
Question # 386

An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?

A.

Review the risk identification process.

B.

Inform the risk scenario owners.

C.

Create a risk awareness communication plan.

D.

Update the risk register.

Full Access
Question # 387

What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?

A.

Mitigation and control value

B.

Volume and scope of data generated daily

C.

Business criticality and sensitivity

D.

Recovery point objective (RPO) and recovery time objective (RTO)

Full Access
Question # 388

Which of the following is the PRIMARY role of the board of directors in corporate risk governance?

A.

Approving operational strategies and objectives

B.

Monitoring the results of actions taken to mitigate risk

C.

Ensuring the effectiveness of the risk management program

D.

Ensuring risk scenarios are identified and recorded in the risk register

Full Access
Question # 389

Which of the following can be interpreted from a single data point on a risk heat map?

A.

Risk tolerance

B.

Risk magnitude

C.

Risk response

D.

Risk appetite

Full Access
Question # 390

A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?

A.

The audit had a broader scope than the CSA.

B.

The CSA was not sample-based.

C.

The CSA did not test control effectiveness.

D.

The CSA was compliance-based, while the audit was risk-based.

Full Access
Question # 391

Which of the following is MOST important for an organization that wants to reduce IT operational risk?

A.

Increasing senior management's understanding of IT operations

B.

Increasing the frequency of data backups

C.

Minimizing complexity of IT infrastructure

D.

Decentralizing IT infrastructure

Full Access
Question # 392

A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:

A.

mitigated

B.

accepted

C.

avoided

D.

deferred

Full Access
Question # 393

Which of the following would BEST help identify the owner for each risk scenario in a risk register?

A.

Determining which departments contribute most to risk

B.

Allocating responsibility for risk factors equally to asset owners

C.

Mapping identified risk factors to specific business processes

D.

Determining resource dependency of assets

Full Access
Question # 394

Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?

A.

Engaging external risk professionals to periodically review the risk

B.

Prioritizing global standards over local requirements in the risk profile

C.

Updating the risk profile with risk assessment results

D.

Assigning quantitative values to qualitative metrics in the risk register

Full Access
Question # 395

Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?

A.

To allocate budget for resolution of risk issues

B.

To determine if new risk scenarios have been identified

C.

To ensure the project timeline is on target

D.

To track the status of risk mitigation actions

Full Access
Question # 396

After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:

A.

record risk scenarios in the risk register for analysis.

B.

validate the risk scenarios for business applicability.

C.

reduce the number of risk scenarios to a manageable set.

D.

perform a risk analysis on the risk scenarios.

Full Access
Question # 397

A new regulator/ requirement imposes severe fines for data leakage involving customers' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?

A.

Reduce retention periods for Pll data.

B.

Move Pll to a highly-secured outsourced site.

C.

Modify business processes to stop collecting Pll.

D.

Implement strong encryption for Pll.

Full Access
Question # 398

An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?

A.

Data may be commingled with other tenants' data.

B.

System downtime does not meet the organization's thresholds.

C.

The infrastructure will be managed by the public cloud administrator.

D.

The cloud provider is not independently certified.

Full Access
Question # 399

An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?

A.

Number of customer records held

B.

Number of databases that host customer data

C.

Number of encrypted customer databases

D.

Number of staff members having access to customer data

Full Access
Question # 400

Which of the following activities should be performed FIRST when establishing IT risk management processes?

A.

Collect data of past incidents and lessons learned.

B.

Conduct a high-level risk assessment based on the nature of business.

C.

Identify the risk appetite of the organization.

D.

Assess the goals and culture of the organization.

Full Access
Question # 401

Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?

A.

Audit and compliance management

B.

The chief information officer (CIO) and the chief financial officer (CFO)

C.

Enterprise risk management and business process owners

D.

Executive management and the board of directors

Full Access
Question # 402

When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?

A.

Unclear organizational risk appetite

B.

Lack of senior management participation

C.

Use of highly customized control frameworks

D.

Reliance on qualitative analysis methods

Full Access
Question # 403

Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?

A.

Qualitative measures for potential loss events

B.

Changes in owners for identified IT risk scenarios

C.

Changes in methods used to calculate probability

D.

Frequent use of risk acceptance as a treatment option

Full Access
Question # 404

Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?

A.

Recommend the IT department remove access to the cloud services.

B.

Engage with the business area managers to review controls applied.

C.

Escalate to the risk committee.

D.

Recommend a risk assessment be conducted.

Full Access
Question # 405

What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?

A.

Aggregated risk may exceed the enterprise's risk appetite and tolerance.

B.

Duplicate resources may be used to manage risk registers.

C.

Standardization of risk management practices may be difficult to enforce.

D.

Risk analysis may be inconsistent due to non-uniform impact and likelihood scales.

Full Access
Question # 406

Which of the following statements BEST describes risk appetite?

A.

The amount of risk an organization is willing to accept

B.

The effective management of risk and internal control environments

C.

Acceptable variation between risk thresholds and business objectives

D.

The acceptable variation relative to the achievement of objectives

Full Access
Question # 407

Which of the following is MOST important to understand when developing key risk indicators (KRIs)?

A.

KRI thresholds

B.

Integrity of the source data

C.

Control environment

D.

Stakeholder requirements

Full Access
Question # 408

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

A.

risk mitigation approach

B.

cost-benefit analysis.

C.

risk assessment results.

D.

vulnerability assessment results

Full Access
Question # 409

Of the following, who should be responsible for determining the inherent risk rating of an application?

A.

Application owner

B.

Senior management

C.

Risk practitioner

D.

Business process owner

Full Access
Question # 410

Which of the following would be MOST beneficial as a key risk indicator (KRI)?

A.

Current capital allocation reserves

B.

Negative security return on investment (ROI)

C.

Project cost variances

D.

Annualized loss projections

Full Access
Question # 411

Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?

A.

Adoption of industry best practices

B.

Involvement of stakeholders in risk assessment

C.

Review of risk scenarios by independent parties

D.

Documentation of potential risk in business cases

Full Access
Question # 412

Which of the following is a KEY responsibility of the second line of defense?

A.

Implementing control activities

B.

Monitoring control effectiveness

C.

Conducting control self-assessments

D.

Owning risk scenarios

Full Access
Question # 413

An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?

A.

Lead auditor

B.

Project manager

C.

Chief audit executive (CAE)

D.

Chief information officer (CIO)

Full Access
Question # 414

IT disaster recovery point objectives (RPOs) should be based on the:

A.

maximum tolerable downtime.

B.

maximum tolerable loss of data.

C.

need of each business unit.

D.

type of business.

Full Access
Question # 415

Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

A.

An updated risk register

B.

Risk assessment results

C.

Technical control validation

D.

Control testing results

Full Access
Question # 416

The BEST way to test the operational effectiveness of a data backup procedure is to:

A.

conduct an audit of files stored offsite.

B.

interview employees to compare actual with expected procedures.

C.

inspect a selection of audit trails and backup logs.

D.

demonstrate a successful recovery from backup files.

Full Access
Question # 417

Which of the following is the GREATEST risk associated with the use of data analytics?

A.

Distributed data sources

B.

Manual data extraction

C.

Incorrect data selection

D.

Excessive data volume

Full Access
Question # 418

A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?

A.

Internal audit

B.

Control owner

C.

Senior management

D.

Risk manager

Full Access
Question # 419

An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?

A.

Organizational strategy

B.

Employee code of conduct

C.

Industry best practices

D.

Organizational policy

Full Access
Question # 420

The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:

A.

vendors providing risk assessments on time.

B.

vendor contracts reviewed in the past year.

C.

vendor risk mitigation action items completed on time.

D.

vendors that have reported control-related incidents.

Full Access
Question # 421

Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?

A.

Insurance coverage

B.

Onsite replacement availability

C.

Maintenance procedures

D.

Installation manuals

Full Access
Question # 422

Reviewing which of the following provides the BEST indication of an organizations risk tolerance?

A.

Risk sharing strategy

B.

Risk transfer agreements

C.

Risk policies

D.

Risk assessments

Full Access
Question # 423

When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?

A.

List of recent incidents affecting industry peers

B.

Results of external attacks and related compensating controls

C.

Gaps between current and desired states of the control environment

D.

Review of leading IT risk management practices within the industry

Full Access
Question # 424

Which of the following provides the MOST important information to facilitate a risk response decision?

A.

Audit findings

B.

Risk appetite

C.

Key risk indicators

D.

Industry best practices

Full Access
Question # 425

Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?

A.

Review vendors' internal risk assessments covering key risk and controls.

B.

Obtain independent control reports from high-risk vendors.

C.

Review vendors performance metrics on quality and delivery of processes.

D.

Obtain vendor references from third parties.

Full Access
Question # 426

Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?

A.

Enhance the security awareness program.

B.

Increase the frequency of incident reporting.

C.

Purchase cyber insurance from a third party.

D.

Conduct a control assessment.

Full Access
Question # 427

Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?

A.

Objectives are confirmed with the business owner.

B.

Control owners approve control changes.

C.

End-user acceptance testing has been conducted.

D.

Performance information in the log is encrypted.

Full Access
Question # 428

An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?

A.

Implement IT systems in alignment with business objectives.

B.

Review metrics and key performance indicators (KPIs).

C.

Review design documentation of IT systems.

D.

Evaluate compliance with legal and regulatory requirements.

Full Access
Question # 429

Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?

A.

Likelihood rating

B.

Control effectiveness

C.

Assessment approach

D.

Impact rating

Full Access
Question # 430

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

A.

increased inherent risk.

B.

higher risk management cost

C.

decreased residual risk.

D.

lower risk management cost.

Full Access
Question # 431

Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?

A.

Key risk indicators (KRIs)

B.

Data backups

C.

Incident response plan

D.

Cyber insurance

Full Access
Question # 432

Which of the following provides the MOST helpful information in identifying risk in an organization?

A.

Risk registers

B.

Risk analysis

C.

Risk scenarios

D.

Risk responses

Full Access
Question # 433

An organization's risk tolerance should be defined and approved by which of the following?

A.

The chief risk officer (CRO)

B.

The board of directors

C.

The chief executive officer (CEO)

D.

The chief information officer (CIO)

Full Access
Question # 434

Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?

A.

Benchmarking parameters likely to affect the results

B.

Tools and techniques used by risk owners to perform the assessments

C.

A risk heat map with a summary of risk identified and assessed

D.

The possible impact of internal and external risk factors on the assessment results

Full Access
Question # 435

Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?

A.

Defining expectations in the enterprise risk policy

B.

Increasing organizational resources to mitigate risks

C.

Communicating external audit results

D.

Avoiding risks that could materialize into substantial losses

Full Access
Question # 436

What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?

A.

Seek approval from the control owner.

B.

Update the action plan in the risk register.

C.

Reassess the risk level associated with the new control.

D.

Validate that the control has an established testing method.

Full Access
Question # 437

The PRIMARY purpose of vulnerability assessments is to:

A.

provide clear evidence that the system is sufficiently secure.

B.

determine the impact of potential threats.

C.

test intrusion detection systems (IDS) and response procedures.

D.

detect weaknesses that could lead to system compromise.

Full Access
Question # 438

Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?

A.

Change testing schedule

B.

Impact assessment of the change

C.

Change communication plan

D.

User acceptance testing (UAT)

Full Access
Question # 439

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.

Business resilience manager

B.

Disaster recovery team lead

C.

Application owner

D.

IT operations manager

Full Access
Question # 440

Which of the following BEST facilitates the development of effective IT risk scenarios?

A.

Utilization of a cross-functional team

B.

Participation by IT subject matter experts

C.

Integration of contingency planning

D.

Validation by senior management

Full Access
Question # 441

An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?

A.

Redesign the heat map.

B.

Review the risk tolerance.

C.

Perform a business impact analysis (BIA)

D.

Update the risk register.

Full Access
Question # 442

The PRIMARY purpose of using control metrics is to evaluate the:

A.

amount of risk reduced by compensating controls.

B.

amount of risk present in the organization.

C.

variance against objectives.

D.

number of incidents.

Full Access
Question # 443

A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?

A.

Report it to the chief risk officer.

B.

Advise the employee to forward the email to the phishing team.

C.

follow incident reporting procedures.

D.

Advise the employee to permanently delete the email.

Full Access
Question # 444

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

A.

A privacy impact assessment has not been completed.

B.

Data encryption methods apply to a subset of Pll obtained.

C.

The data privacy officer was not consulted.

D.

Insufficient access controls are used on the loT devices.

Full Access
Question # 445

The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?

A.

The risk impact changes.

B.

The risk classification changes.

C.

The inherent risk changes.

D.

The residual risk changes.

Full Access
Question # 446

An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do

FIRST?

A.

Confirm the vulnerabilities with the third party

B.

Identify procedures to mitigate the vulnerabilities.

C.

Notify information security management.

D.

Request IT to remove the system from the network.

Full Access
Question # 447

What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?

A.

Documenting project lessons learned

B.

Validating the risk mitigation project has been completed

C.

Confirming that the project budget was not exceeded

D.

Verifying that the risk level has been lowered

Full Access
Question # 448

Which of the following is the PRIMARY objective for automating controls?

A.

Improving control process efficiency

B.

Facilitating continuous control monitoring

C.

Complying with functional requirements

D.

Reducing the need for audit reviews

Full Access
Question # 449

An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?

A.

Identify staff members who have access to the organization's sensitive data.

B.

Identify locations where the organization's sensitive data is stored.

C.

Identify risk scenarios and owners associated with possible data loss vectors.

D.

Identify existing data loss controls and their levels of effectiveness.

Full Access
Question # 450

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

A.

Risk tolerance

B.

Risk appetite

C.

Risk awareness

D.

Risk policy

Full Access
Question # 451

Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?

A.

Updating the threat inventory with new threats

B.

Automating log data analysis

C.

Preventing the generation of false alerts

D.

Determining threshold levels

Full Access
Question # 452

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

A.

Risk exposure expressed in business terms

B.

Recommendations for risk response options

C.

Resource requirements for risk responses

D.

List of business areas affected by the risk

Full Access
Question # 453

Which of the following is MOST important to sustainable development of secure IT services?

A.

Security training for systems development staff

B.

\Well-documented business cases

C.

Security architecture principles

D.

Secure coding practices

Full Access
Question # 454

Which of the following is the BEST approach for determining whether a risk action plan is effective?

A.

Comparing the remediation cost against budget

B.

Assessing changes in residual risk

C.

Assessing the inherent risk

D.

Monitoring changes of key performance indicators(KPIs)

Full Access
Question # 455

Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?

A.

Loss expectancy information

B.

Control performance predictions

C.

IT service level agreements (SLAs)

D.

Remediation activity progress

Full Access
Question # 456

When testing the security of an IT system, il is MOST important to ensure that;

A.

tests are conducted after business hours.

B.

operators are unaware of the test.

C.

external experts execute the test.

D.

agreement is obtained from stakeholders.

Full Access
Question # 457

An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?

A.

Chief information security officer

B.

Business process owner

C.

Chief risk officer

D.

IT controls manager

Full Access
Question # 458

A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?

A.

The user requirements were not documented.

B.

Payroll files were not under the control of a librarian.

C.

The programmer had access to the production programs.

D.

The programmer did not involve the user in testing.

Full Access
Question # 459

Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?

A.

Testing in a non-production environment

B.

Performing a security control review

C.

Reviewing the security audit report

D.

Conducting a risk assessment

Full Access
Question # 460

The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?

A.

Perform a risk assessment.

B.

Accept the risk of not implementing.

C.

Escalate to senior management.

D.

Update the implementation plan.

Full Access
Question # 461

It is MOST important to the effectiveness of an IT risk management function that the associated processes are:

A.

aligned to an industry-accepted framework.

B.

reviewed and approved by senior management.

C.

periodically assessed against regulatory requirements.

D.

updated and monitored on a continuous basis.

Full Access
Question # 462

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

A.

risk appetite.

B.

security policies

C.

process maps.

D.

risk tolerance level

Full Access
Question # 463

An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 464

The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:

A.

the third-party website manager

B.

the business process owner

C.

IT security

D.

the compliance manager

Full Access
Question # 465

For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?

A.

Temporarily increase the risk threshold.

B.

Suspend processing to investigate the problem.

C.

Initiate a feasibility study for a new application.

D.

Conduct a root-cause analysis.

Full Access
Question # 466

The MOST effective approach to prioritize risk scenarios is by:

A.

assessing impact to the strategic plan.

B.

aligning with industry best practices.

C.

soliciting input from risk management experts.

D.

evaluating the cost of risk response.

Full Access
Question # 467

Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:

A.

trending data is available.

B.

process flowcharts are current.

C.

measurement objectives are defined.

D.

data collection technology is available.

Full Access
Question # 468

Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?

A.

The impact of controls on the efficiency of the business in delivering services

B.

Linkage of identified risk scenarios with enterprise risk management

C.

Potential threats and vulnerabilities that may have an impact on the business

D.

Results of network vulnerability scanning and penetration testing

Full Access
Question # 469

Which of the following BEST helps to balance the costs and benefits of managing IT risk?

A.

Prioritizing risk responses

B.

Evaluating risk based on frequency and probability

C.

Considering risk factors that can be quantified

D.

Managing the risk by using controls

Full Access
Question # 470

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

A.

Project sponsor

B.

Process owner

C.

Risk manager

D.

Internal auditor

Full Access
Question # 471

Which of the following is the PRIMARY reason for an organization to ensure the risk register is updated regularly?

A.

Risk assessment results are accessible to senior management and stakeholders.

B.

Risk mitigation activities are managed and coordinated.

C.

Key risk indicators (KRIs) are evaluated to validate they are still within the risk threshold.

D.

Risk information is available to enable risk-based decisions.

Full Access
Question # 472

A maturity model will BEST indicate:

A.

confidentiality and integrity.

B.

effectiveness and efficiency.

C.

availability and reliability.

D.

certification and accreditation.

Full Access