New Year Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CRISC

CRISC Certified in Risk and Information Systems Control Question and Answers

Question # 4

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Full Access
Question # 5

When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:

A.

process flow.

B.

business impact analysis (BIA).

C.

service level agreement (SLA).

D.

system architecture.

Full Access
Question # 6

Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?

A.

Conduct penetration testing.

B.

Interview IT operations personnel.

C.

Conduct vulnerability scans.

D.

Review change control board documentation.

Full Access
Question # 7

Which of the following BEST enables effective IT control implementation?

A.

Key risk indicators (KRIs)

B.

Documented procedures

C.

Information security policies

D.

Information security standards

Full Access
Question # 8

An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?

A.

Acquisition

B.

Implementation

C.

Initiation

D.

Operation and maintenance

Full Access
Question # 9

Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?

A.

Reassessing control effectiveness of the process

B.

Conducting a post-implementation review to determine lessons learned

C.

Reporting key performance indicators (KPIs) for core processes

D.

Establishing escalation procedures for anomaly events

Full Access
Question # 10

What is the MAIN benefit of using a top-down approach to develop risk scenarios?

A.

It describes risk events specific to technology used by the enterprise.

B.

It establishes the relationship between risk events and organizational objectives.

C.

It uses hypothetical and generic risk events specific to the enterprise.

D.

It helps management and the risk practitioner to refine risk scenarios.

Full Access
Question # 11

Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?

A.

To support decision-making for risk response

B.

To hold risk owners accountable for risk action plans

C.

To secure resourcing for risk treatment efforts

D.

To enable senior management to compile a risk profile

Full Access
Question # 12

The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.

After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?

A.

Risk Impact Rating

B.

Risk Owner

C.

Risk Likelihood Rating

D.

Risk Exposure

Full Access
Question # 13

A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?

A.

Risk manager

B.

Control owner

C.

Control tester

D.

Risk owner

Full Access
Question # 14

Which of the following is MOST important information to review when developing plans for using emerging technologies?

A.

Existing IT environment

B.

IT strategic plan

C.

Risk register

D.

Organizational strategic plan

Full Access
Question # 15

An organization control environment is MOST effective when:

A.

control designs are reviewed periodically

B.

controls perform as intended.

C.

controls are implemented consistently.

D.

controls operate efficiently

Full Access
Question # 16

An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?

A.

Nondisclosure agreements (NDAs)

B.

Data anonymization

C.

Data cleansing

D.

Data encryption

Full Access
Question # 17

An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:

A.

risk mitigation.

B.

risk evaluation.

C.

risk appetite.

D.

risk tolerance.

Full Access
Question # 18

Who is the BEST person to the employee personal data?

A.

Human resources (HR) manager

B.

System administrator

C.

Data privacy manager

D.

Compliance manager

Full Access
Question # 19

A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:

A.

risk score

B.

risk impact

C.

risk response

D.

risk likelihood.

Full Access
Question # 20

The BEST metric to demonstrate that servers are configured securely is the total number of servers:

A.

exceeding availability thresholds

B.

experiencing hardware failures

C.

exceeding current patching standards.

D.

meeting the baseline for hardening.

Full Access
Question # 21

Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?

A.

The cost associated with incident response activities

The composition and number of records in the information asset

B.

The maximum levels of applicable regulatory fines

C.

The length of time between identification and containment of the incident

Full Access
Question # 22

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?

A.

Implement a release and deployment plan

B.

Conduct comprehensive regression testing.

C.

Develop enterprise-wide key risk indicators (KRls)

D.

Include business management on a weekly risk and issues report

Full Access
Question # 23

An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

A.

Recommend risk remediation

B.

Change the level of risk appetite

C.

Document formal acceptance of the risk

D.

Reject the business initiative

Full Access
Question # 24

When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:

A.

information risk assessments with enterprise risk assessments.

B.

key risk indicators (KRIs) with risk appetite of the business.

C.

the control key performance indicators (KPIs) with audit findings.

D.

control performance with risk tolerance of business owners.

Full Access
Question # 25

Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?

A.

Cost and benefit

B.

Security and availability

C.

Maintainability and reliability

D.

Performance and productivity

Full Access
Question # 26

Which of the following presents the GREATEST challenge to managing an organization's end-user devices?

A.

Incomplete end-user device inventory

B.

Unsupported end-user applications

C.

Incompatible end-user devices

D.

Multiple end-user device models

Full Access
Question # 27

A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach

A.

fail to identity all relevant issues.

B.

be too costly

C.

violate laws in other countries

D.

be too line consuming

Full Access
Question # 28

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

A.

Code review

B.

Penetration test

C.

Gap assessment

D.

Business impact analysis (BIA)

Full Access
Question # 29

Who should be responsible (of evaluating the residual risk after a compensating control has been

A.

Compliance manager

B.

Risk owner

C.

Control owner

D.

Risk practitioner

Full Access
Question # 30

Which of the following would MOST likely require a risk practitioner to update the risk register?

A.

An alert being reported by the security operations center.

B.

Development of a project schedule for implementing a risk response

C.

Completion of a project for implementing a new control

D.

Engagement of a third party to conduct a vulnerability scan

Full Access
Question # 31

An organization maintains independent departmental risk registers that are not automatically aggregated. Which of the following is the GREATEST concern?

A.

Management may be unable to accurately evaluate the risk profile.

B.

Resources may be inefficiently allocated.

C.

The same risk factor may be identified in multiple areas.

D.

Multiple risk treatment efforts may be initiated to treat a given risk.

Full Access
Question # 32

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Full Access
Question # 33

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.

Control owner

B.

Risk owner

C.

Internal auditor

D.

Compliance manager

Full Access
Question # 34

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

A.

Information security officer

B.

IT risk manager

C.

Business owner

D.

Chief risk officer (CRO)

Full Access
Question # 35

An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization's customer service operations overseas. Which of the following would MOST significantly impact management's decision?

A.

Time zone difference of the outsourcing location

B.

Ongoing financial viability of the outsourcing company

C.

Cross-border information transfer restrictions in the outsourcing country

D.

Historical network latency between the organization and outsourcing location

Full Access
Question # 36

Which of the following provides the MOST reliable evidence of a control's effectiveness?

A.

A risk and control self-assessment

B.

Senior management's attestation

C.

A system-generated testing report

D.

detailed process walk-through

Full Access
Question # 37

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

A.

The difference In the management practices between each company

B.

The cloud computing environment is shared with another company

C.

The lack of a service level agreement (SLA) in the vendor contract

D.

The organizational culture differences between each country

Full Access
Question # 38

Which of the following would be of GREATEST concern regarding an organization's asset management?

A.

Lack of a mature records management program

B.

Lack of a dedicated asset management team

C.

Decentralized asset lists

D.

Incomplete asset inventory

Full Access
Question # 39

An organization recently configured a new business division Which of the following is MOST likely to be affected?

A.

Risk profile

B.

Risk culture

C.

Risk appetite

D.

Risk tolerance

Full Access
Question # 40

The MAIN purpose of selecting a risk response is to.

A.

ensure compliance with local regulatory requirements

B.

demonstrate the effectiveness of risk management practices.

C.

ensure organizational awareness of the risk level

D.

mitigate the residual risk to be within tolerance

Full Access
Question # 41

Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?

A.

Temporarily mitigate the OS vulnerabilities

B.

Document and implement a patching process

C.

Evaluate permanent fixes such as patches and upgrades

D.

Identify the vulnerabilities and applicable OS patches

Full Access
Question # 42

Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?

A.

Configuration validation

B.

Control attestation

C.

Penetration testing

D.

Internal audit review

Full Access
Question # 43

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.

Prioritizing and addressing risk in line with risk appetite

. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

Full Access
Question # 44

As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?

A.

An assessment of threats to the organization

B.

An assessment of recovery scenarios

C.

industry standard framework

D.

Documentation of testing procedures

Full Access
Question # 45

Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?

A.

Impact analysis

B.

Control analysis

C.

Root cause analysis

D.

Threat analysis

Full Access
Question # 46

An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?

A.

Accept the risk and document contingency plans for data disruption.

B.

Remove the associated risk scenario from the risk register due to avoidance.

C.

Mitigate the risk with compensating controls enforced by the third-party cloud provider.

D.

Validate the transfer of risk and update the register to reflect the change.

Full Access
Question # 47

Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?

A.

High percentage of lagging indicators

B.

Nonexistent benchmark analysis

C.

Incomplete documentation for KRI monitoring

D.

Ineffective methods to assess risk

Full Access
Question # 48

Which of the following sources is MOST relevant to reference when updating security awareness training materials?

A.

Risk management framework

B.

Risk register

C.

Global security standards

D.

Recent security incidents reported by competitors

Full Access
Question # 49

Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?

A.

Analyzing cyber intelligence reports

B.

Engaging independent cybersecurity consultants

C.

Increasing the frequency of updates to the risk register

D.

Reviewing the outcome of the latest security risk assessment

Full Access
Question # 50

The MAJOR reason to classify information assets is

A.

maintain a current inventory and catalog of information assets

B.

determine their sensitivity and critical

C.

establish recovery time objectives (RTOs)

D.

categorize data into groups

Full Access
Question # 51

Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?

A.

Risk register

B.

Risk appetite

C.

Risk priorities

D.

Risk heat maps

Full Access
Question # 52

Which of the following is the BEST method of creating risk awareness in an organization?

A.

Marking the risk register available to project stakeholders

B.

Ensuring senior management commitment to risk training

C.

Providing regular communication to risk managers

D.

Appointing the risk manager from the business units

Full Access
Question # 53

Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?

A.

Well documented policies and procedures

B.

Risk and issue tracking

C.

An IT strategy committee

D.

Change and release management

Full Access
Question # 54

An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?

A.

Data minimization

B.

Accountability

C.

Accuracy

D.

Purpose limitation

Full Access
Question # 55

Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?

A.

Fiscal management practices

B.

Business maturity

C.

Budget for implementing security

D.

Management culture

Full Access
Question # 56

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 57

Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?

A.

Improving risk awareness

B.

Obtaining buy-in from risk owners

C.

Leveraging existing metrics

D.

Optimizing risk treatment decisions

Full Access
Question # 58

Which of the following is the MOST effective way to mitigate identified risk scenarios?

A.

Assign ownership of the risk response plan

B.

Provide awareness in early detection of risk.

C.

Perform periodic audits on identified risk.

D.

areas Document the risk tolerance of the organization.

Full Access
Question # 59

Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?

A.

Disciplinary action

B.

A control self-assessment

C.

A review of the awareness program

D.

Root cause analysis

Full Access
Question # 60

Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?

A.

Results of current and past risk assessments

B.

Organizational strategy and objectives

C.

Lessons learned from materialized risk scenarios

D.

Internal and external audit findings

Full Access
Question # 61

As part of an overall IT risk management plan, an IT risk register BEST helps management:

A.

align IT processes with business objectives.

B.

communicate the enterprise risk management policy.

C.

stay current with existing control status.

D.

understand the organizational risk profile.

Full Access
Question # 62

An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?

A.

Data may be commingled with other tenants' data.

B.

System downtime does not meet the organization's thresholds.

C.

The infrastructure will be managed by the public cloud administrator.

D.

The cloud provider is not independently certified.

Full Access
Question # 63

The PRIMARY purpose of using control metrics is to evaluate the:

A.

amount of risk reduced by compensating controls.

B.

amount of risk present in the organization.

C.

variance against objectives.

D.

number of incidents.

Full Access
Question # 64

Deviation from a mitigation action plan's completion date should be determined by which of the following?

A.

Change management as determined by a change control board

B.

Benchmarking analysis with similar completed projects

C.

Project governance criteria as determined by the project office

D.

The risk owner as determined by risk management processes

Full Access
Question # 65

Which of the following is MOST effective against external threats to an organizations confidential information?

A.

Single sign-on

B.

Data integrity checking

C.

Strong authentication

D.

Intrusion detection system

Full Access
Question # 66

Which of the following is the MAIN reason for documenting the performance of controls?

A.

Obtaining management sign-off

B.

Demonstrating effective risk mitigation

C.

Justifying return on investment

D.

Providing accurate risk reporting

Full Access
Question # 67

Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?

A.

Identify the potential risk.

B.

Monitor employee usage.

C.

Assess the potential risk.

D.

Develop risk awareness training.

Full Access
Question # 68

A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?

A.

Preventive

B.

Detective

C.

Directive

D.

Deterrent

Full Access
Question # 69

Which of the following BEST facilitates the development of effective IT risk scenarios?

A.

Utilization of a cross-functional team

B.

Participation by IT subject matter experts

C.

Integration of contingency planning

D.

Validation by senior management

Full Access
Question # 70

A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:

A.

mitigated

B.

accepted

C.

avoided

D.

deferred

Full Access
Question # 71

Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?

A.

Business context

B.

Risk tolerance level

C.

Resource requirements

D.

Benchmarking information

Full Access
Question # 72

An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?

A.

Disaster recovery plan (DRP) of the system

B.

Right to audit the provider

C.

Internal controls to ensure data privacy

D.

Transparency of key performance indicators (KPIs)

Full Access
Question # 73

An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?

A.

Redesign the heat map.

B.

Review the risk tolerance.

C.

Perform a business impact analysis (BIA)

D.

Update the risk register.

Full Access
Question # 74

Which of the following is the MOST important component of effective security incident response?

A.

Network time protocol synchronization

B.

Identification of attack sources

C.

Early detection of breaches

D.

A documented communications plan

Full Access
Question # 75

Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?

A.

Adoption of industry best practices

B.

Involvement of stakeholders in risk assessment

C.

Review of risk scenarios by independent parties

D.

Documentation of potential risk in business cases

Full Access
Question # 76

Which of the following is the BEST way to support communication of emerging risk?

A.

Update residual risk levels to reflect the expected risk impact.

B.

Adjust inherent risk levels upward.

C.

Include it on the next enterprise risk committee agenda.

D.

Include it in the risk register for ongoing monitoring.

Full Access
Question # 77

During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?

A.

Business process owners

B.

Business process consumers

C.

Application architecture team

D.

Internal audit

Full Access
Question # 78

Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?

A.

Vulnerability scanning

B.

Continuous monitoring and alerting

C.

Configuration management

D.

Access controls and active logging

Full Access
Question # 79

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.

Risk likelihood

B.

Inherent risk

C.

Risk appetite

D.

Risk tolerance

Full Access
Question # 80

A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?

A.

Recommend avoiding the risk.

B.

Validate the risk response with internal audit.

C.

Update the risk register.

D.

Evaluate outsourcing the process.

Full Access
Question # 81

Which of these documents is MOST important to request from a cloud service

provider during a vendor risk assessment?

A.

Nondisclosure agreement (NDA)

B.

Independent audit report

C.

Business impact analysis (BIA)

D.

Service level agreement (SLA)

Full Access
Question # 82

Which of the following is MOST important for a risk practitioner to ensure once a risk action plan has been completed?

A.

The risk owner has validated outcomes.

B.

The risk register has been updated.

C.

The control objectives are mapped to risk objectives.

D.

The requirements have been achieved.

Full Access
Question # 83

Which of the following activities is PRIMARILY the responsibility of senior management?

A.

Bottom-up identification of emerging risks

B.

Categorization of risk scenarios against a standard taxonomy

C.

Prioritization of risk scenarios based on severity

D.

Review of external loss data

Full Access
Question # 84

Which of the following is a KEY responsibility of the second line of defense?

A.

Implementing control activities

B.

Monitoring control effectiveness

C.

Conducting control self-assessments

D.

Owning risk scenarios

Full Access
Question # 85

A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?

A.

The alternative site is a hot site with equipment ready to resume processing immediately.

B.

The contingency plan provides for backup media to be taken to the alternative site.

C.

The contingency plan for high priority applications does not involve a shared cold site.

D.

The alternative site does not reside on the same fault to matter how the distance apart.

Full Access
Question # 86

Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?

A.

Organizational strategy

B.

Cost-benefit analysis

C.

Control self-assessment (CSA)

D.

Business requirements

Full Access
Question # 87

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.

Business resilience manager

B.

Disaster recovery team lead

C.

Application owner

D.

IT operations manager

Full Access
Question # 88

The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?

A.

Perform a risk assessment.

B.

Accept the risk of not implementing.

C.

Escalate to senior management.

D.

Update the implementation plan.

Full Access
Question # 89

Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?

A.

Increased number of controls

B.

Reduced risk level

C.

Increased risk appetite

D.

Stakeholder commitment

Full Access
Question # 90

IT disaster recovery point objectives (RPOs) should be based on the:

A.

maximum tolerable downtime.

B.

maximum tolerable loss of data.

C.

need of each business unit.

D.

type of business.

Full Access
Question # 91

After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:

A.

record risk scenarios in the risk register for analysis.

B.

validate the risk scenarios for business applicability.

C.

reduce the number of risk scenarios to a manageable set.

D.

perform a risk analysis on the risk scenarios.

Full Access
Question # 92

Of the following, who should be responsible for determining the inherent risk rating of an application?

A.

Application owner

B.

Senior management

C.

Risk practitioner

D.

Business process owner

Full Access
Question # 93

Who should be responsible for strategic decisions on risk management?

A.

Chief information officer (CIO)

B.

Executive management team

C.

Audit committee

D.

Business process owner

Full Access
Question # 94

After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?

A.

Escalate the issue to the service provider.

B.

Re-certify the application access controls.

C.

Remove the developer's access.

D.

Review the results of pre-migration testing.

Full Access
Question # 95

An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?

A.

Identify staff members who have access to the organization's sensitive data.

B.

Identify locations where the organization's sensitive data is stored.

C.

Identify risk scenarios and owners associated with possible data loss vectors.

D.

Identify existing data loss controls and their levels of effectiveness.

Full Access
Question # 96

Which of the following criteria is MOST important when developing a response to an attack that would compromise data?

A.

The recovery time objective (RTO)

B.

The likelihood of a recurring attack

C.

The organization's risk tolerance

D.

The business significance of the information

Full Access
Question # 97

An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?

A.

Review the risk identification process.

B.

Inform the risk scenario owners.

C.

Create a risk awareness communication plan.

D.

Update the risk register.

Full Access
Question # 98

A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?

A.

Enable data encryption in the test environment

B.

Implement equivalent security in the test environment.

C.

Prevent the use of production data for test purposes

D.

Mask data before being transferred to the test environment.

Full Access
Question # 99

The annualized loss expectancy (ALE) method of risk analysis:

A.

helps in calculating the expected cost of controls

B.

uses qualitative risk rankings such as low. medium and high.

C.

can be used m a cost-benefit analysts

D.

can be used to determine the indirect business impact.

Full Access
Question # 100

Which of the following is MOST important for senior management to review during an acquisition?

A.

Risk appetite and tolerance

B.

Risk framework and methodology

C.

Key risk indicator (KRI) thresholds

D.

Risk communication plan

Full Access
Question # 101

A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?

A.

Protect sensitive information with access controls.

B.

Implement a data loss prevention (DLP) solution.

C.

Re-communicate the data protection policy.

D.

Implement a data encryption solution.

Full Access
Question # 102

Which of the following BEST reduces the probability of laptop theft?

A.

Cable lock

B.

Acceptable use policy

C.

Data encryption

D.

Asset tag with GPS

Full Access
Question # 103

Which of the following is the BEST way to identify changes in the risk profile of an organization?

A.

Monitor key risk indicators (KRIs).

B.

Monitor key performance indicators (KPIs).

C.

Interview the risk owner.

D.

Conduct a gap analysis

Full Access
Question # 104

A risk practitioner has just learned about new done FIRST?

A.

Notify executive management.

B.

Analyze the impact to the organization.

C.

Update the IT risk register.

D.

Design IT risk mitigation plans.

Full Access
Question # 105

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

A.

identifying risk scenarios.

B.

determining the risk strategy.

C.

calculating impact and likelihood.

D.

completing the controls catalog.

Full Access
Question # 106

An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:

A.

mitigation.

B.

avoidance.

C.

transfer.

D.

acceptance.

Full Access
Question # 107

When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:

A.

risk map

B.

cause-and-effect diagram

C.

maturity model

D.

technology strategy plan.

Full Access
Question # 108

Whose risk tolerance matters MOST when making a risk decision?

A.

Customers who would be affected by a breach

B.

Auditors, regulators and standards organizations

C.

The business process owner of the exposed assets

D.

The information security manager

Full Access
Question # 109

An organization has decided to implement an emerging technology and incorporate the new capabilities into its strategic business plan. Business operations for the technology will be outsourced. What will be the risk practitioner's PRIMARY role during the change?

A.

Managing third-party risk

B.

Developing risk scenarios

C.

Managing the threat landscape

D.

Updating risk appetite

Full Access
Question # 110

A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?

A.

Monitoring of service costs

B.

Provision of internal audit reports

C.

Notification of sub-contracting arrangements

D.

Confidentiality of customer data

Full Access
Question # 111

Which of the following is the BEST way to ensure ongoing control effectiveness?

A.

Establishing policies and procedures

B.

Periodically reviewing control design

C.

Measuring trends in control performance

D.

Obtaining management control attestations

Full Access
Question # 112

Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?

A.

Obtaining funding support

B.

Defining the risk assessment scope

C.

Selecting the risk assessment framework

D.

Establishing inherent risk

Full Access
Question # 113

Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?

A.

To enhance compliance with standards

B.

To minimize subjectivity of assessments

C.

To increase consensus among peers

D.

To provide assessments for benchmarking

Full Access
Question # 114

Which of the following statements in an organization's current risk profile report is cause for further action by senior management?

A.

Key performance indicator (KPI) trend data is incomplete.

B.

New key risk indicators (KRIs) have been established.

C.

Key performance indicators (KPIs) are outside of targets.

D.

Key risk indicators (KRIs) are lagging.

Full Access
Question # 115

An organization is making significant changes to an application. At what point should the application risk profile be updated?

A.

After user acceptance testing (UAT)

B.

Upon release to production

C.

During backlog scheduling

D.

When reviewing functional requirements

Full Access
Question # 116

Which of the following BEST confirms the existence and operating effectiveness of information systems controls?

A.

Self-assessment questionnaires completed by management

B.

Review of internal audit and third-party reports

C.

Management review and sign-off on system documentation

D.

First-hand direct observation of the controls in operation

Full Access
Question # 117

The FIRST task when developing a business continuity plan should be to:

A.

determine data backup and recovery availability at an alternate site.

B.

identify critical business functions and resources.

C.

define roles and responsibilities for implementation.

D.

identify recovery time objectives (RTOs) for critical business applications.

Full Access
Question # 118

A maturity model will BEST indicate:

A.

confidentiality and integrity.

B.

effectiveness and efficiency.

C.

availability and reliability.

D.

certification and accreditation.

Full Access
Question # 119

A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?

A.

Review the design of the machine learning model against control objectives.

B.

Adopt the machine learning model as a replacement for current manual access reviews.

C.

Ensure the model assists in meeting regulatory requirements for access controls.

D.

Discourage the use of emerging technologies in key processes.

Full Access
Question # 120

Which of the following is the GREATEST concern associated with business end users developing their own applications on end user spreadsheets and database programs?

A.

An IT project manager is not assigned to oversee development.

B.

Controls are not applied to the applications.

C.

There is a lack of technology recovery options.

D.

The applications are not captured in the risk profile.

Full Access
Question # 121

The BEST way to test the operational effectiveness of a data backup procedure is to:

A.

conduct an audit of files stored offsite.

B.

interview employees to compare actual with expected procedures.

C.

inspect a selection of audit trails and backup logs.

D.

demonstrate a successful recovery from backup files.

Full Access
Question # 122

Which of the following is MOST critical to the design of relevant risk scenarios?

A.

The scenarios are based on past incidents.

B.

The scenarios are linked to probable organizational situations.

C.

The scenarios are mapped to incident management capabilities.

D.

The scenarios are aligned with risk management capabilities.

Full Access
Question # 123

An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?

A.

Sections of the policy that may justify not implementing the requirement

B.

Risk associated with the inability to implement the requirement

C.

Budget justification to implement the new requirement during the current year

D.

Industry best practices with respect to implementation of the proposed control

Full Access
Question # 124

A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:

A.

strategy.

B.

profile.

C.

process.

D.

map.

Full Access
Question # 125

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

A.

To deliver projects on time and on budget

B.

To assess inherent risk

C.

To include project risk in the enterprise-wide IT risk profit.

D.

To assess risk throughout the project

Full Access
Question # 126

Which of the following BEST supports the communication of risk assessment results to stakeholders?

A.

Monitoring of high-risk areas

B.

Classification of risk profiles

C.

Periodic review of the risk register

D.

Assignment of risk ownership

Full Access
Question # 127

It is MOST important to the effectiveness of an IT risk management function that the associated processes are:

A.

aligned to an industry-accepted framework.

B.

reviewed and approved by senior management.

C.

periodically assessed against regulatory requirements.

D.

updated and monitored on a continuous basis.

Full Access
Question # 128

Which of the following is a crucial component of a key risk indicator (KRI) to ensure appropriate action is taken to mitigate risk?

A.

Management intervention

B.

Risk appetite

C.

Board commentary

D.

Escalation triggers

Full Access
Question # 129

The purpose of requiring source code escrow in a contractual agreement is to:

A.

ensure that the source code is valid and exists.

B.

ensure that the source code is available if the vendor ceases to exist.

C.

review the source code for adequacy of controls.

D.

ensure the source code is available when bugs occur.

Full Access
Question # 130

Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?

A.

Assigning identification dates for risk scenarios in the risk register

B.

Updating impact assessments for risk scenario

C.

Verifying whether risk action plans have been completed

D.

Reviewing key risk indicators (KRIS)

Full Access
Question # 131

Which of the following activities should be performed FIRST when establishing IT risk management processes?

A.

Collect data of past incidents and lessons learned.

B.

Conduct a high-level risk assessment based on the nature of business.

C.

Identify the risk appetite of the organization.

D.

Assess the goals and culture of the organization.

Full Access
Question # 132

An organization's financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?

A.

IT risk manager

B.

IT system owner

C.

Information security manager

D.

Business owner

Full Access
Question # 133

Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?

A.

An annual contract review

B.

A service level agreement (SLA)

C.

A requirement to adopt an established risk management framework

D.

A requirement to provide an independent audit report

Full Access
Question # 134

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

A.

Project sponsor

B.

Process owner

C.

Risk manager

D.

Internal auditor

Full Access
Question # 135

During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?

A.

Include the new risk scenario in the current risk assessment.

B.

Postpone the risk assessment until controls are identified.

C.

Request the risk scenario be removed from the register.

D.

Exclude the new risk scenario from the current risk assessment

Full Access
Question # 136

Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?

A.

The KRIs' source data lacks integrity.

B.

The KRIs are not automated.

C.

The KRIs are not quantitative.

D.

The KRIs do not allow for trend analysis.

Full Access
Question # 137

Which of the following should be the PRIMARY recipient of reports showing the

progress of a current IT risk mitigation project?

A.

Senior management

B.

Project manager

C.

Project sponsor

D.

IT risk manager

Full Access
Question # 138

The PRIMARY purpose of vulnerability assessments is to:

A.

provide clear evidence that the system is sufficiently secure.

B.

determine the impact of potential threats.

C.

test intrusion detection systems (IDS) and response procedures.

D.

detect weaknesses that could lead to system compromise.

Full Access
Question # 139

A large organization is replacing its enterprise resource planning (ERP) system and has decided not to deploy the payroll module of the new system. Instead, the current payroll system will continue to be

used. Of the following, who should own the risk if the ERP and payroll system fail to operate as expected?

A.

The business owner

B.

The ERP administrator

C.

The project steering committee

D.

The IT project manager

Full Access
Question # 140

Which of the following is the MOST effective way to integrate business risk management with IT operations?

A.

Perform periodic IT control self-assessments.

B.

Require a risk assessment with change requests.

C.

Provide security awareness training.

D.

Perform periodic risk assessments.

Full Access
Question # 141

An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 142

A new regulator/ requirement imposes severe fines for data leakage involving customers' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?

A.

Reduce retention periods for Pll data.

B.

Move Pll to a highly-secured outsourced site.

C.

Modify business processes to stop collecting Pll.

D.

Implement strong encryption for Pll.

Full Access
Question # 143

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner's NEXT step?

A.

Develop a mechanism for monitoring residual risk.

B.

Update the risk register with the results.

C.

Prepare a business case for the response options.

D.

Identify resources for implementing responses.

Full Access
Question # 144

Which of the following should be the PRIMARY basis for prioritizing risk responses?

A.

The impact of the risk

B.

The replacement cost of the business asset

C.

The cost of risk mitigation controls

D.

The classification of the business asset

Full Access
Question # 145

During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?

A.

Risk management framework adopted by each company

B.

Risk registers of both companies

C.

IT balanced scorecard of each company

D.

Most recent internal audit findings from both companies

Full Access
Question # 146

Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors

A.

Frequency of business continuity plan (BCP) lasting

B.

Frequency and number of new software releases

C.

Frequency and duration of unplanned downtime

D.

Number of IT support staff available after business hours

Full Access
Question # 147

Which of the following is the result of a realized risk scenario?

A.

Technical event

B.

Threat event

C.

Vulnerability event

D.

Loss event

Full Access
Question # 148

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

A.

Transborder data transfer restrictions

B.

Differences in regional standards

C.

Lack of monitoring over vendor activities

D.

Lack of after-hours incident management support

Full Access
Question # 149

Which of the following BEST enables a risk practitioner to understand management's approach to organizational risk?

A.

Organizational structure and job descriptions

B.

Risk appetite and risk tolerance

C.

Industry best practices for risk management

D.

Prior year's risk assessment results

Full Access
Question # 150

An organization is measuring the effectiveness of its change management program to reduce the number of unplanned production changes. Which of the following would be the BEST metric to determine if the program is performing as expected?

A.

Decrease in the time to move changes to production

B.

Ratio of emergency fixes to total changes

C.

Ratio of system changes to total changes

D.

Decrease in number of changes without a fallback plan

Full Access
Question # 151

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

A.

Enroll the employee in additional security training.

B.

Invoke the incident response plan.

C.

Conduct an internal audit.

D.

Instruct the vendor to delete the data.

Full Access
Question # 152

Which of the following is the BEST way to determine software license compliance?

A.

List non-compliant systems in the risk register.

B.

Conduct periodic compliance reviews.

C.

Review whistleblower reports of noncompliance.

D.

Monitor user software download activity.

Full Access
Question # 153

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

A.

Using an aggregated view of organizational risk

B.

Ensuring relevance to organizational goals

C.

Relying on key risk indicator (KRI) data Including

D.

Trend analysis of risk metrics

Full Access
Question # 154

The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?

A.

Perform a root cause analysis

B.

Perform a code review

C.

Implement version control software.

D.

Implement training on coding best practices

Full Access
Question # 155

After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?

A.

The risk practitioner

B.

The business process owner

C.

The risk owner

D.

The control owner

Full Access
Question # 156

Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?

A.

Reviewing control objectives

B.

Aligning with industry best practices

C.

Consulting risk owners

D.

Evaluating KPIs in accordance with risk appetite

Full Access
Question # 157

Which of the following is the BEST way to detect zero-day malware on an end user's workstation?

A.

An antivirus program

B.

Database activity monitoring

C.

Firewall log monitoring

D.

File integrity monitoring

Full Access
Question # 158

Which of the following BEST confirms the existence and operating effectiveness of information systems controls?

A.

Self-assessment questionnaires completed by management

B.

Review of internal audit and third-party reports

C.

Management review and sign-off on system documentation

D.

First-hand direct observation of the controls in operation

Full Access
Question # 159

Risk aggregation in a complex organization will be MOST successful when:

A.

using the same scales in assessing risk

B.

utilizing industry benchmarks

C.

using reliable qualitative data for risk Hems

D.

including primarily low-level risk factors

Full Access
Question # 160

Which of the following will BEST support management repotting on risk?

A.

Risk policy requirements

B.

A risk register

C.

Control self-assessment

D.

Key performance Indicators

Full Access
Question # 161

Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?

A.

Perform a gap analysis

B.

Conduct system testing

C.

Implement compensating controls

D.

Update security policies

Full Access
Question # 162

A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner’s BEST course of action to determine root cause?

A.

Review the risk profile

B.

Review pokey change history

C.

interview the control owner

D.

Perform control testing

Full Access
Question # 163

Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?

A.

Use production data in a non-production environment

B.

Use masked data in a non-production environment

C.

Use test data in a production environment

D.

Use anonymized data in a non-production environment

Full Access
Question # 164

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs assist in the preparation of the organization's risk profile.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization

D.

KRIs provide an early warning that a risk threshold is about to be reached.

Full Access
Question # 165

When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:

A.

Assess generic risk scenarios with business users.

B.

Validate the generic risk scenarios for relevance.

C.

Select the maximum possible risk scenarios from the list.

D.

Identify common threats causing generic risk scenarios

Full Access
Question # 166

Which of the following is the MOST important outcome of a business impact analysis (BIA)?

A.

Understanding and prioritization of critical processes

B.

Completion of the business continuity plan (BCP)

C.

Identification of regulatory consequences

D.

Reduction of security and business continuity threats

Full Access
Question # 167

Which of the following is MOST helpful to understand the consequences of an IT risk event?

A.

Fault tree analysis

B.

Historical trend analysis

C.

Root cause analysis

D.

Business impact analysis (BIA)

Full Access
Question # 168

Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

A.

To provide input to the organization's risk appetite

B.

To monitor the vendor's control effectiveness

C.

To verify the vendor's ongoing financial viability

D.

To assess the vendor's risk mitigation plans

Full Access
Question # 169

When preparing a risk status report for periodic review by senior management, it is MOST important to ensure the report includes

A.

risk exposure in business terms

B.

a detailed view of individual risk exposures

C.

a summary of incidents that have impacted the organization.

D.

recommendations by an independent risk assessor.

Full Access
Question # 170

When establishing an enterprise IT risk management program, it is MOST important to:

A.

review alignment with the organizations strategy.

B.

understand the organization's information security policy.

C.

validate the organization's data classification scheme.

D.

report identified IT risk scenarios to senior management.

Full Access
Question # 171

Who is MOST appropriate to be assigned ownership of a control

A.

The individual responsible for control operation

B.

The individual informed of the control effectiveness

C.

The individual responsible for resting the control

D.

The individual accountable for monitoring control effectiveness

Full Access
Question # 172

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

A.

The volume of risk scenarios is too large

B.

Risk aggregation has not been completed

C.

Risk scenarios are not applicable

D.

The risk analysts for each scenario is incomplete

Full Access
Question # 173

Which of the following BEST indicates effective information security incident management?

A.

Monthly trend of information security-related incidents

B.

Average time to identify critical information security incidents

C.

Frequency of information security incident response plan testing

D.

Percentage of high-risk security incidents

Full Access
Question # 174

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

A.

Weak governance structures

B.

Senior management scrutiny

C.

Complex regulatory environment

D.

Unclear reporting relationships

Full Access
Question # 175

A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?

A.

Reviewing access control lists

B.

Authorizing user access requests

C.

Performing user access recertification

D.

Terminating inactive user access

Full Access
Question # 176

Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?

A.

Total cost to support the policy

B.

Number of exceptions to the policy

C.

Total cost of policy breaches

D.

Number of inquiries regarding the policy

Full Access
Question # 177

The risk associated with an asset after controls are applied can be expressed as:

A.

a function of the cost and effectiveness of controls.

B.

the likelihood of a given threat.

C.

a function of the likelihood and impact.

D.

the magnitude of an impact.

Full Access
Question # 178

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

A.

Risk exposure expressed in business terms

B.

Recommendations for risk response options

C.

Resource requirements for risk responses

D.

List of business areas affected by the risk

Full Access
Question # 179

A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:

A.

update the risk register to reflect the correct level of residual risk.

B.

ensure risk monitoring for the project is initiated.

C.

conduct and document a business impact analysis (BIA).

D.

verify cost-benefit of the new controls being implemented.

Full Access
Question # 180

The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

A.

obtain the support of executive management.

B.

map the business processes to supporting IT and other corporate resources.

C.

identify critical business processes and the degree of reliance on support services.

D.

document the disaster recovery process.

Full Access
Question # 181

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

A.

Monitoring risk responses

B.

Applying risk treatments

C.

Providing assurance of control effectiveness

D.

Implementing internal controls

Full Access
Question # 182

Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?

A.

Updating the risk register to include the risk mitigation plan

B.

Determining processes for monitoring the effectiveness of the controls

C.

Ensuring that control design reduces risk to an acceptable level

D.

Confirming to management the controls reduce the likelihood of the risk

Full Access
Question # 183

What are the MOST essential attributes of an effective Key control indicator (KCI)?

A.

Flexibility and adaptability

B.

Measurability and consistency

C.

Robustness and resilience

D.

Optimal cost and benefit

Full Access
Question # 184

Which of the following is the PRIMARY role of a data custodian in the risk management process?

A.

Performing periodic data reviews according to policy

B.

Reporting and escalating data breaches to senior management

C.

Being accountable for control design

D.

Ensuring data is protected according to the classification

Full Access
Question # 185

The PRIMARY advantage of involving end users in continuity planning is that they:

A.

have a better understanding of specific business needs

B.

can balance the overall technical and business concerns

C.

can see the overall impact to the business

D.

are more objective than information security management.

Full Access
Question # 186

To help identify high-risk situations, an organization should:

A.

continuously monitor the environment.

B.

develop key performance indicators (KPIs).

C.

maintain a risk matrix.

D.

maintain a risk register.

Full Access
Question # 187

The PRIMARY objective of a risk identification process is to:

A.

evaluate how risk conditions are managed.

B.

determine threats and vulnerabilities.

C.

estimate anticipated financial impact of risk conditions.

D.

establish risk response options.

Full Access
Question # 188

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

A.

Do not collect or retain data that is not needed.

B.

Redact data where possible.

C.

Limit access to the personal data.

D.

Ensure all data is encrypted at rest and during transit.

Full Access
Question # 189

When is the BEST to identify risk associated with major project to determine a mitigation plan?

A.

Project execution phase

B.

Project initiation phase

C.

Project closing phase

D.

Project planning phase

Full Access
Question # 190

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

A.

involve IT leadership in the policy development process

B.

Require business users to sign acknowledgment of the poises

C.

involve business owners in the pokey development process

D.

Provide policy owners with greater enforcement authority

Full Access
Question # 191

Before assigning sensitivity levels to information it is MOST important to:

A.

define recovery time objectives (RTOs).

B.

define the information classification policy

C.

conduct a sensitivity analyse

D.

Identify information custodians

Full Access
Question # 192

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

A.

Control effectiveness

B.

Risk appetite

C.

Risk likelihood

D.

Key risk indicator (KRI)

Full Access
Question # 193

Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?

A.

Prioritizing risk within each business unit

B.

Reviewing risk ranking methodology

C.

Promoting an organizational culture of risk awareness

D.

Assigning risk ownership to appropriate roles

Full Access
Question # 194

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

A.

data logging and monitoring

B.

data mining and analytics

C.

data classification and labeling

D.

data retention and destruction

Full Access
Question # 195

Which of the following is MOST important to promoting a risk-aware culture?

A.

Regular testing of risk controls

B.

Communication of audit findings

C.

Procedures for security monitoring

D.

Open communication of risk reporting

Full Access
Question # 196

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

A.

Management approval

B.

Annual review

C.

Relevance

D.

Automation

Full Access
Question # 197

Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?

A.

To align with board reporting requirements

B.

To assist management in decision making

C.

To create organization-wide risk awareness

D.

To minimize risk mitigation efforts

Full Access
Question # 198

Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?

A.

KRI design must precede definition of KCIs.

B.

KCIs and KRIs are independent indicators and do not impact each other.

C.

A decreasing trend of KRI readings will lead to changes to KCIs.

D.

Both KRIs and KCIs provide insight to potential changes in the level of risk.

Full Access
Question # 199

A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?

A.

Assessing risk with no controls in place

B.

Showing projected residual risk

C.

Providing peer benchmarking results

D.

Assessing risk with current controls in place

Full Access
Question # 200

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

A.

Sharing company information on social media

B.

Sharing personal information on social media

C.

Using social media to maintain contact with business associates

D.

Using social media for personal purposes during working hours

Full Access
Question # 201

Which of the following will help ensure the elective decision-making of an IT risk management committee?

A.

Key stakeholders are enrolled as members

B.

Approved minutes ate forwarded to senior management

C.

Committee meets at least quarterly

D.

Functional overlap across the business is minimized

Full Access
Question # 202

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?

A.

Ask the business to make a budget request to remediate the problem.

B.

Build a business case to remediate the fix.

C.

Research the types of attacks the threat can present.

D.

Determine the impact of the missing threat.

Full Access
Question # 203

A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls. Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?

A.

Identify previous data breaches using the startup company’s audit reports.

B.

Have the data privacy officer review the startup company’s data protection policies.

C.

Classify and protect the data according to the parent company's internal standards.

D.

Implement a firewall and isolate the environment from the parent company's network.

Full Access
Question # 204

Which of the following controls BEST helps to ensure that transaction data reaches its destination?

A.

Securing the network from attacks

B.

Providing acknowledgments from receiver to sender

C.

Digitally signing individual messages

D.

Encrypting data-in-transit

Full Access
Question # 205

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

A.

Sustained financial loss

B.

Cost of remediation efforts

C.

Duration of service outage

D.

Average time to recovery

Full Access
Question # 206

A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?

A.

Sensitivity of the data

B.

Readability of test data

C.

Security of the test environment

D.

Availability of data to authorized staff

Full Access
Question # 207

Who should have the authority to approve an exception to a control?

A.

information security manager

B.

Control owner

C.

Risk owner

D.

Risk manager

Full Access
Question # 208

The PRIMARY purpose of IT control status reporting is to:

A.

ensure compliance with IT governance strategy.

B.

assist internal audit in evaluating and initiating remediation efforts.

C.

benchmark IT controls with Industry standards.

D.

facilitate the comparison of the current and desired states.

Full Access
Question # 209

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

A.

stakeholder risk tolerance.

B.

benchmarking criteria.

C.

suppliers used by the organization.

D.

the control environment.

Full Access
Question # 210

Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?

A.

Building an organizational risk profile after updating the risk register

B.

Ensuring risk owners participate in a periodic control testing process

C.

Designing a process for risk owners to periodically review identified risk

D.

Implementing a process for ongoing monitoring of control effectiveness

Full Access
Question # 211

Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:

A.

is in charge of information security.

B.

is responsible for enterprise risk management (ERM)

C.

can implement remediation action plans.

D.

is accountable for loss if the risk materializes.

Full Access
Question # 212

Which of the following MUST be updated to maintain an IT risk register?

A.

Expected frequency and potential impact

B.

Risk tolerance

C.

Enterprise-wide IT risk assessment

D.

Risk appetite

Full Access
Question # 213

Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?

A.

Internal and external information security incidents

B.

The risk department's roles and responsibilities

C.

Policy compliance requirements and exceptions process

D.

The organization's information security risk profile

Full Access
Question # 214

The MOST important objective of information security controls is to:

A.

Identify threats and vulnerability

B.

Ensure alignment with industry standards

C.

Provide measurable risk reduction

D.

Enforce strong security solutions

Full Access
Question # 215

In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?

A.

Implementation

B.

Development

C.

Design

D.

Feasibility

Full Access
Question # 216

The MAIN reason for creating and maintaining a risk register is to:

A.

assess effectiveness of different projects.

B.

define the risk assessment methodology.

C.

ensure assets have low residual risk.

D.

account for identified key risk factors.

Full Access
Question # 217

When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?

A.

a identity conditions that may cause disruptions

B.

Review incident response procedures

C.

Evaluate the probability of risk events

D.

Define metrics for restoring availability

Full Access
Question # 218

Which of the following is the BEST indication of a mature organizational risk culture?

A.

Corporate risk appetite is communicated to staff members.

B.

Risk owners understand and accept accountability for risk.

C.

Risk policy has been published and acknowledged by employees.

D.

Management encourages the reporting of policy breaches.

Full Access
Question # 219

Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?

A.

Percentage of high-risk vulnerabilities missed

B.

Number of high-risk vulnerabilities outstanding

C.

Defined thresholds for high-risk vulnerabilities

D.

Percentage of high-risk vulnerabilities addressed

Full Access
Question # 220

Risk acceptance of an exception to a security control would MOST likely be justified when:

A.

automation cannot be applied to the control

B.

business benefits exceed the loss exposure.

C.

the end-user license agreement has expired.

D.

the control is difficult to enforce in practice.

Full Access
Question # 221

When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?

A.

Acceptance

B.

Mitigation

C.

Transfer

D.

Avoidance

Full Access
Question # 222

Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?

A.

Automated access revocation

B.

Daily transaction reconciliation

C.

Rule-based data analytics

D.

Role-based user access model

Full Access
Question # 223

Which of the following represents a vulnerability?

A.

An identity thief seeking to acquire personal financial data from an organization

B.

Media recognition of an organization's market leadership in its industry

C.

A standard procedure for applying software patches two weeks after release

D.

An employee recently fired for insubordination

Full Access
Question # 224

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

A.

Percentage of IT assets with current malware definitions

B.

Number of false positives defected over a period of time

C.

Number of alerts generated by the anti-virus software

D.

Frequency of anti-vinjs software updates

Full Access
Question # 225

Who should be PRIMARILY responsible for establishing an organization's IT risk culture?

A.

Business process owner

B.

Executive management

C.

Risk management

D.

IT management

Full Access
Question # 226

Which of the following should be done FIRST when developing a data protection management plan?

A.

Perform a cost-benefit analysis.

B.

Identify critical data.

C.

Establish a data inventory.

D.

Conduct a risk analysis.

Full Access
Question # 227

The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:

A.

risk is treated appropriately

B.

mitigating actions are prioritized

C.

risk entries are regularly updated

D.

risk exposure is minimized.

Full Access
Question # 228

Which of the following is a KEY consideration for a risk practitioner to communicate to senior management evaluating the introduction of artificial intelligence (Al) solutions into the organization?

A.

Al requires entirely new risk management processes.

B.

Al potentially introduces new types of risk.

C.

Al will result in changes to business processes.

D.

Third-party Al solutions increase regulatory obligations.

Full Access
Question # 229

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

A.

Relevance

B.

Annual review

C.

Automation

D.

Management approval

Full Access
Question # 230

Which of the following BEST facilitates the mitigation of identified gaps between current and desired risk environment states?

A.

Develop a risk treatment plan.

B.

Validate organizational risk appetite.

C.

Review results of prior risk assessments.

D.

Include the current and desired states in the risk register.

Full Access
Question # 231

When evaluating enterprise IT risk management it is MOST important to:

A.

create new control processes to reduce identified IT risk scenarios

B.

confirm the organization’s risk appetite and tolerance

C.

report identified IT risk scenarios to senior management

D.

review alignment with the organization's investment plan

Full Access
Question # 232

Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?

A.

Key performance indicators (KPIs)

B.

Risk heat maps

C.

Internal audit findings

D.

Periodic penetration testing

Full Access
Question # 233

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

A.

Evaluating risk impact

B.

Establishing key performance indicators (KPIs)

C.

Conducting internal audits

D.

Creating quarterly risk reports

Full Access
Question # 234

Which of the following provides the BEST evidence that a selected risk treatment plan is effective?

A.

Identifying key risk indicators (KRIs)

B.

Evaluating the return on investment (ROI)

C.

Evaluating the residual risk level

D.

Performing a cost-benefit analysis

Full Access
Question # 235

Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?

A.

Improved senior management communication

B.

Optimized risk treatment decisions

C.

Enhanced awareness of risk management

D.

Improved collaboration among risk professionals

Full Access
Question # 236

Which of the following is the PRIMARY purpose of periodically reviewing an organization's risk profile?

A.

Align business objectives with risk appetite.

B.

Enable risk-based decision making.

C.

Design and implement risk response action plans.

D.

Update risk responses in the risk register

Full Access
Question # 237

The PRIMARY purpose of using a framework for risk analysis is to:

A.

improve accountability

B.

improve consistency

C.

help define risk tolerance

D.

help develop risk scenarios.

Full Access
Question # 238

A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?

A.

Customer database manager

B.

Customer data custodian

C.

Data privacy officer

D.

Audit committee

Full Access
Question # 239

Which of the following is the MOST important consideration when selecting key risk indicators (KRIs) to monitor risk trends over time?

A.

Ongoing availability of data

B.

Ability to aggregate data

C.

Ability to predict trends

D.

Availability of automated reporting systems

Full Access
Question # 240

A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:

A.

mitigation plans for threat events should be prepared in the current planning period.

B.

this risk scenario is equivalent to more frequent but lower impact risk scenarios.

C.

the current level of risk is within tolerance.

D.

an increase in threat events could cause a loss sooner than anticipated.

Full Access
Question # 241

An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?

A.

Reduced ability to evaluate key risk indicators (KRIs)

B.

Reduced access to internal audit reports

C.

Dependency on the vendor's key performance indicators (KPIs)

D.

Dependency on service level agreements (SLAs)

Full Access
Question # 242

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

Full Access
Question # 243

An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?

A.

Require the vendor to degauss the hard drives

B.

Implement an encryption policy for the hard drives.

C.

Require confirmation of destruction from the IT manager.

D.

Use an accredited vendor to dispose of the hard drives.

Full Access
Question # 244

A maturity model is MOST useful to an organization when it:

A.

benchmarks against other organizations

B.

defines a qualitative measure of risk

C.

provides a reference for progress

D.

provides risk metrics.

Full Access
Question # 245

The acceptance of control costs that exceed risk exposure MOST likely demonstrates:

A.

corporate culture alignment

B.

low risk tolerance

C.

high risk tolerance

D.

corporate culture misalignment.

Full Access
Question # 246

An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the country where it is collected. Which of the following should be done FIRST when addressing this situation?

A.

Analyze data protection methods.

B.

Understand data flows.

C.

Include a right-to-audit clause.

D.

Implement strong access controls.

Full Access
Question # 247

What is the PRIMARY purpose of a business impact analysis (BIA)?

A.

To determine the likelihood and impact of threats to business operations

B.

To identify important business processes in the organization

C.

To estimate resource requirements for related business processes

D.

To evaluate the priority of business operations in case of disruption

Full Access
Question # 248

Which of the following is a drawback in the use of quantitative risk analysis?

A.

It assigns numeric values to exposures of assets.

B.

It requires more resources than other methods

C.

It produces the results in numeric form.

D.

It is based on impact analysis of information assets.

Full Access
Question # 249

Which of the following is the BEST way to quantify the likelihood of risk materialization?

A.

Balanced scorecard

B.

Threat and vulnerability assessment

C.

Compliance assessments

D.

Business impact analysis (BIA)

Full Access
Question # 250

Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?

A.

Mean time to recover (MTTR)

B.

IT system criticality classification

C.

Incident management service level agreement (SLA)

D.

Recovery time objective (RTO)

Full Access
Question # 251

An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?

A.

The third party's IT operations manager

B.

The organization's process owner

C.

The third party's chief risk officer (CRO)

D.

The organization's risk practitioner

Full Access
Question # 252

Which of the following is the BEST indicator of an effective IT security awareness program?

A.

Decreased success rate of internal phishing tests

B.

Decreased number of reported security incidents

C.

Number of disciplinary actions issued for security violations

D.

Number of employees that complete security training

Full Access
Question # 253

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

A.

A record of incidents is maintained.

B.

Forensic investigations are facilitated.

C.

Security violations can be identified.

D.

Developing threats are detected earlier.

Full Access
Question # 254

Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?

A.

Requiring a printer access code for each user

B.

Using physical controls to access the printer room

C.

Using video surveillance in the printer room

D.

Ensuring printer parameters are properly configured

Full Access
Question # 255

Which of the following is MOST important when developing key risk indicators (KRIs)?

A.

Alignment with regulatory requirements

B.

Availability of qualitative data

C.

Properly set thresholds

D.

Alignment with industry benchmarks

Full Access
Question # 256

A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?

A.

Identify changes in risk factors and initiate risk reviews.

B.

Engage an external consultant to redesign the risk management process.

C.

Outsource the process for updating the risk register.

D.

Implement a process improvement and replace the old risk register.

Full Access
Question # 257

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

A.

Complete an offsite business continuity exercise.

B.

Conduct a compliance check against standards.

C.

Perform a vulnerability assessment.

D.

Measure the change in inherent risk.

Full Access
Question # 258

An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?

A.

Risk manager

B.

Data owner

C.

End user

D.

IT department

Full Access
Question # 259

An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?

A.

More time has been allotted for testing.

B.

The project is likely to deliver the product late.

C.

A new project manager is handling the project.

D.

The cost of the project will exceed the allotted budget.

Full Access
Question # 260

Which of the following is MOST important to the successful development of IT risk scenarios?

A.

Cost-benefit analysis

B.

Internal and external audit reports

C.

Threat and vulnerability analysis

D.

Control effectiveness assessment

Full Access
Question # 261

Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?

A.

Number of times the recovery plan is reviewed

B.

Number of successful recovery plan tests

C.

Percentage of systems with outdated virus protection

D.

Percentage of employees who can work remotely

Full Access
Question # 262

A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?

A.

Regulatory requirements may differ in each country.

B.

Data sampling may be impacted by various industry restrictions.

C.

Business advertising will need to be tailored by country.

D.

The data analysis may be ineffective in achieving objectives.

Full Access
Question # 263

The MOST important consideration when selecting a control to mitigate an identified risk is whether:

A.

the cost of control exceeds the mitigation value

B.

there are sufficient internal resources to implement the control

C.

the mitigation measures create compounding effects

D.

the control eliminates the risk

Full Access
Question # 264

Which of the following BEST supports ethical IT risk management practices?

A.

Robust organizational communication channels

B.

Mapping of key risk indicators (KRIs) to corporate strategy

C.

Capability maturity models integrated with risk management frameworks

D.

Rigorously enforced operational service level agreements (SLAs)

Full Access
Question # 265

Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?

A.

Key risk indicators (KRIs)

B.

The owner of the financial reporting process

C.

The risk rating of affected financial processes

D.

The list of relevant financial controls

Full Access
Question # 266

Which of the following methods is an example of risk mitigation?

A.

Not providing capability for employees to work remotely

B.

Outsourcing the IT activities and infrastructure

C.

Enforcing change and configuration management processes

D.

Taking out insurance coverage for IT-related incidents

Full Access
Question # 267

Which of the following is the BEST course of action to help reduce the probability of an incident recurring?

A.

Perform a risk assessment.

B.

Perform root cause analysis.

C.

Initiate disciplinary action.

D.

Update the incident response plan.

Full Access
Question # 268

Which of the following is MOST important to include in a risk assessment of an emerging technology?

A.

Risk response plans

B.

Risk and control ownership

C.

Key controls

D.

Impact and likelihood ratings

Full Access
Question # 269

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?

A.

Percentage of job failures identified and resolved during the recovery process

B.

Percentage of processes recovered within the recovery time and point objectives

C.

Number of current test plans and procedures

D.

Number of issues and action items resolved during the recovery test

Full Access
Question # 270

When of the following 15 MOST important when developing a business case for a proposed security investment?

A.

identification of control requirements

B.

Alignment to business objectives

C.

Consideration of new business strategies

D.

inclusion of strategy for regulatory compliance

Full Access
Question # 271

Which of the following BEST indicates whether security awareness training is effective?

A.

User self-assessment

B.

User behavior after training

C.

Course evaluation

D.

Quality of training materials

Full Access
Question # 272

Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?

A.

The sum of residual risk levels for each scenario

B.

The loss expectancy for aggregated risk scenarios

C.

The highest loss expectancy among the risk scenarios

D.

The average of anticipated residual risk levels

Full Access
Question # 273

Legal and regulatory risk associated with business conducted over the Internet is driven by:

A.

the jurisdiction in which an organization has its principal headquarters

B.

international law and a uniform set of regulations.

C.

the laws and regulations of each individual country

D.

international standard-setting bodies.

Full Access
Question # 274

Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?

A.

Encrypt the data while in transit lo the supplier

B.

Contractually obligate the supplier to follow privacy laws.

C.

Require independent audits of the supplier's control environment

D.

Utilize blockchain during the data transfer

Full Access
Question # 275

The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:

A.

the proposed controls are implemented as scheduled.

B.

security controls are tested prior to implementation.

C.

compliance with corporate policies.

D.

the risk response strategy has been decided.

Full Access
Question # 276

Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?

A.

Device corruption

B.

Data loss

C.

Malicious users

D.

User support

Full Access
Question # 277

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

A.

Number of training sessions completed

B.

Percentage of staff members who complete the training with a passing score

C.

Percentage of attendees versus total staff

D.

Percentage of staff members who attend the training with positive feedback

Full Access
Question # 278

An organization has detected unauthorized logins to its client database servers. Which of the following should be of GREATEST concern?

A.

Potential increase in regulatory scrutiny

B.

Potential system downtime

C.

Potential theft of personal information

D.

Potential legal risk

Full Access
Question # 279

When reviewing a report on the performance of control processes, it is MOST important to verify whether the:

A.

business process objectives have been met.

B.

control adheres to regulatory standards.

C.

residual risk objectives have been achieved.

D.

control process is designed effectively.

Full Access
Question # 280

A risk practitioner has discovered a deficiency in a critical system that cannot be patched. Which of the following should be the risk practitioner's FIRST course of action?

A.

Report the issue to internal audit.

B.

Submit a request to change management.

C.

Conduct a risk assessment.

D.

Review the business impact assessment.

Full Access
Question # 281

Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?

A.

Cause-and-effect diagram

B.

Delphi technique

C.

Bottom-up approach

D.

Top-down approach

Full Access
Question # 282

Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?

A.

Customized regional training on local laws and regulations

B.

Policies requiring central reporting of potential procedure exceptions

C.

Ongoing awareness training to support a common risk culture

D.

Zero-tolerance policies for risk taking by middle-level managers

Full Access
Question # 283

Which of the following is the result of a realized risk scenario?

A.

Threat event

B.

Vulnerability event

C.

Technical event

D.

Loss event

Full Access
Question # 284

Which of the following BEST indicates that an organization has implemented IT performance requirements?

A.

Service level agreements (SLA)

B.

Vendor references

C.

Benchmarking data

D.

Accountability matrix

Full Access
Question # 285

Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?

A.

The vendor must provide periodic independent assurance reports.

B.

The vendor must host data in a specific geographic location.

C.

The vendor must be held liable for regulatory fines for failure to protect data.

D.

The vendor must participate in an annual vendor performance review.

Full Access
Question # 286

The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:

A.

serve as a basis for measuring risk appetite.

B.

align with the organization's risk profile.

C.

provide a warning of emerging high-risk conditions.

D.

provide data for updating the risk register.

Full Access
Question # 287

An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?

A.

Include a nondisclosure agreement (NDA) for personal data in the contract.

B.

Implement a digital rights protection tool to monitor data.

C.

Use a virtual private network (VPN) to communicate data.

D.

Transfer a read-only version of the data.

Full Access
Question # 288

Which process is MOST effective to determine relevance of threats for risk scenarios?

A.

Vulnerability assessment

B.

Business impact analysis (BIA)

C.

Penetration testing

D.

Root cause analysis

Full Access
Question # 289

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

A.

To provide insight into the effectiveness of the internal control environment

B.

To provide a basis for determining the criticality of risk mitigation controls

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide early warning signs of a potential change in risk level

Full Access
Question # 290

Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?

A.

Risk management budget

B.

Risk management industry trends

C.

Risk tolerance

D.

Risk capacity

Full Access
Question # 291

Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?

A.

Regularly updated risk management procedures

B.

A management-approved risk dashboard

C.

A current control framework

D.

A regularly updated risk register

Full Access
Question # 292

The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?

A.

Insufficient risk tolerance

B.

Optimized control management

C.

Effective risk management

D.

Over-controlled environment

Full Access
Question # 293

Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?

A.

Conducting periodic reviews of authorizations granted

B.

Revoking access for users changing roles

C.

Monitoring user activity using security logs

D.

Granting access based on least privilege

Full Access
Question # 294

A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?

A.

Corrective

B.

Detective

C.

Deterrent

D.

Preventative

Full Access
Question # 295

Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?

A.

Risk management

B.

Business units

C.

External audit

D.

Internal audit

Full Access
Question # 296

Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?

A.

Defined remediation plans

B.

Management sign-off on the scope

C.

Manual testing of device vulnerabilities

D.

Visibility into all networked devices

Full Access
Question # 297

An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?

A.

Whether the service provider's data center is located in the same country

B.

Whether the data sent by email has been encrypted

C.

Whether the data has been appropriately classified

D.

Whether the service provider contract allows right of onsite audit

Full Access
Question # 298

Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?

A.

Proportion of end users having more than one account

B.

Percentage of accounts disabled within the service level agreement (SLA)

C.

Proportion of privileged to non-privileged accounts

D.

Percentage of accounts that have not been activated

Full Access
Question # 299

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

Full Access
Question # 300

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Establishing a series of key risk indicators (KRIs)

B.

Adding risk triggers to entries in the risk register

C.

Implementing key performance indicators (KPIs)

D.

Developing contingency plans for key processes

Full Access
Question # 301

Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Creating metrics to track remote connections

B.

Updating the organizational policy for remote access

C.

Updating remote desktop software

D.

Implementing multi-factor authentication

Full Access
Question # 302

A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?

A.

Implement new controls.

B.

Recalibrate the key performance indicator (KPI).

C.

Redesign the process.

D.

Re-evaluate the existing control design.

Full Access
Question # 303

Which of the following BEST facilitates the development of relevant risk scenarios?

A.

Perform quantitative risk analysis of historical data.

B.

Adopt an industry-recognized risk framework.

C.

Use qualitative risk assessment methodologies.

D.

Conduct brainstorming sessions with key stakeholders.

Full Access
Question # 304

Which of the following is MOST useful for measuring the existing risk management process against a desired state?

A.

Balanced scorecard

B.

Risk management framework

C.

Capability maturity model

D.

Risk scenario analysis

Full Access
Question # 305

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

A.

introduced into production without high-risk issues.

B.

having the risk register updated regularly.

C.

having key risk indicators (KRIs) established to measure risk.

D.

having an action plan to remediate overdue issues.

Full Access
Question # 306

A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?

A.

Negotiating terms of adoption

B.

Understanding the timeframe to implement

C.

Completing a gap analysis

D.

Initiating the conversion

Full Access
Question # 307

Which of the following events is MOST likely to trigger the need to conduct a risk assessment?

A.

An incident resulting in data loss

B.

Introduction of a new product line

C.

Changes in executive management

D.

Updates to the information security policy

Full Access
Question # 308

An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?

A.

Risk tolerance

B.

Risk appetite

C.

Inherent risk

D.

Residual risk

Full Access
Question # 309

Which of the following is the MOST important consideration when prioritizing risk response?

A.

Requirements for regulatory obligations.

B.

Cost of control implementation.

C.

Effectiveness of risk treatment.

D.

Number of risk response options.

Full Access
Question # 310

When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?

A.

Results of benchmarking studies

B.

Results of risk assessments

C.

Number of emergency change requests

D.

Maturity model

Full Access
Question # 311

Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?

A.

Regional competitors' policies and standards

B.

Ability to monitor and enforce compliance

C.

Industry-standard templates

D.

Differences in regulatory requirements

Full Access
Question # 312

After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

A.

A decrease in threats

B.

A change in the risk profile

C.

An increase in reported vulnerabilities

D.

An increase in identified risk scenarios

Full Access
Question # 313

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Full Access
Question # 314

Which of the following should be reported periodically to the risk committee?

A.

System risk and control matrix

B.

Emerging IT risk scenarios

C.

Changes to risk assessment methodology

D.

Audit committee charter

Full Access
Question # 315

Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?

A.

Risk owner

B.

Risk practitioner

C.

Compliance manager

D.

Control owner

Full Access
Question # 316

Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?

A.

Making data available to a larger audience of customers

B.

Data not being disposed according to the retention policy

C.

Personal data not being de-identified properly

D.

Data being used for purposes the data subjects have not opted into

Full Access
Question # 317

During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?

A.

Report the infraction.

B.

Perform a risk assessment.

C.

Conduct risk awareness training.

D.

Discontinue the process.

Full Access
Question # 318

Which of the following is the BEST risk management approach for the strategic IT planning process?

A.

Key performance indicators (KPIs) are established to track IT strategic initiatives.

B.

The IT strategic plan is reviewed by the chief information security officer (CISO) and enterprise risk management (ERM).

C.

The IT strategic plan is developed from the organization-wide risk management plan.

D.

Risk scenarios associated with IT strategic initiatives are identified and assessed.

Full Access
Question # 319

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

A.

Assemble an incident response team.

B.

Create a disaster recovery plan (DRP).

C.

Develop a risk response plan.

D.

Initiate a business impact analysis (BIA).

Full Access
Question # 320

Which of the following is BEST measured by key control indicators (KCIs)?

A.

Historical trends of the organizational risk profile.

B.

Cost efficiency of risk treatment plan projects.

C.

Comprehensiveness of risk assessment procedures.

D.

Effectiveness of organizational defense in depth.

Full Access
Question # 321

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Establishing a series of key risk indicators (KRIs)

B.

Adding risk triggers to entries in the risk register

C.

Implementing key performance indicators (KPIs)

D.

Developing contingency plans for key processes

Full Access
Question # 322

Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?

A.

Communicating risk awareness materials regularly

B.

Establishing key risk indicators (KRIs) to monitor risk management processes

C.

Ensuring that business activities minimize inherent risk

D.

Embedding risk management in business activities

Full Access
Question # 323

Which organizational role should be accountable for ensuring information assets are appropriately classified?

A.

Data protection officer

B.

Chief information officer (CIO)

C.

Information asset custodian

D.

Information asset owner

Full Access
Question # 324

A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?

A.

Subscribe to threat intelligence to monitor external attacks.

B.

Apply patches for a newer version of the application.

C.

Segment the application within the existing network.

D.

Increase the frequency of regular system and data backups.

Full Access
Question # 325

Which of the following is MOST helpful when prioritizing action plans for identified risk?

A.

Comparing risk rating against appetite

B.

Obtaining input from business units

C.

Determining cost of controls to mitigate risk

D.

Ranking the risk based on likelihood of occurrence

Full Access
Question # 326

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

A.

Initiate disciplinary action against the risk owner.

B.

Reassess the risk and review the underlying controls.

C.

Review organizational ethics policies.

D.

Report the activity to the supervisor.

Full Access
Question # 327

An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on the organization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?

A.

Obfuscate the customers’ personal information.

B.

Require the business partner to delete personal information following the audit.

C.

Use a secure channel to transmit the files.

D.

Ensure the contract includes provisions for sharing personal information.

Full Access
Question # 328

An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?

A.

Implement continuous control monitoring.

B.

Communicate the risk to management.

C.

Introduce recovery control procedures.

D.

Document a risk response plan.

Full Access
Question # 329

Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?

A.

Variances between organizational risk appetites

B.

Different taxonomies to categorize risk scenarios

C.

Disparate platforms for governance, risk, and compliance (GRC) systems

D.

Dissimilar organizational risk acceptance protocols

Full Access
Question # 330

An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?

A.

Determine whether the impact is outside the risk appetite.

B.

Report the ineffective control for inclusion in the next audit report.

C.

Request a formal acceptance of risk from senior management.

D.

Deploy a compensating control to address the identified deficiencies.

Full Access
Question # 331

Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?

A.

Business impact assessment (BIA)

B.

Key performance indicators (KPIs)

C.

Risk profile

D.

Industry benchmark analysis

Full Access
Question # 332

Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?

A.

Cost-benefit analysis

B.

Risk tolerance

C.

Known vulnerabilities

D.

Cyber insurance

Full Access
Question # 333

The risk to an organization's reputation due to a recent cybersecurity breach is PRIMARILY considered to be:

A.

financial risk.

B.

data risk.

C.

operational risk.

D.

strategic risk.

Full Access
Question # 334

Which of the following BEST protects organizational data within a production cloud environment?

A.

Data encryption

B.

Continuous log monitoring

C.

Right to audit

D.

Data obfuscation

Full Access
Question # 335

An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?

A.

Implementing an emergency change authorization process

B.

Periodically reviewing operator logs

C.

Limiting the number of super users

D.

Reviewing the programmers' emergency change reports

Full Access
Question # 336

A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?

A.

Impact of the change on inherent risk

B.

Approval for the change by the risk owner

C.

Business rationale for the change

D.

Risk to the mitigation effort due to the change

Full Access
Question # 337

An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?

A.

Lack of cross-functional risk assessment workshops within the organization

B.

Lack of common understanding of the organization's risk culture

C.

Lack of quantitative methods to aggregate the total risk exposure

D.

Lack of an integrated risk management system to aggregate risk scenarios

Full Access
Question # 338

A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?

A.

Correct the vulnerabilities to mitigate potential risk exposure.

B.

Develop a risk response action plan with key stakeholders.

C.

Assess the level of risk associated with the vulnerabilities.

D.

Communicate the vulnerabilities to the risk owner.

Full Access
Question # 339

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

A.

Comparative analysis of peer companies

B.

Reviews of brokerage firm assessments

C.

Interviews with senior management

D.

Trend analysis using prior annual reports

Full Access
Question # 340

An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?

A.

Due diligence for the recommended cloud vendor has not been performed.

B.

The business can introduce new Software as a Service (SaaS) solutions without IT approval.

C.

The maintenance of IT infrastructure has been outsourced to an Infrastructure as a Service (laaS) provider.

D.

Architecture responsibilities may not be clearly defined.

Full Access
Question # 341

Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?

A.

Adherence to legal and compliance requirements

B.

Reduction in the number of test cases in the acceptance phase

C.

Establishment of digital forensic architectures

D.

Consistent management of information assets

Full Access
Question # 342

An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?

A.

Obtain adequate cybersecurity insurance coverage.

B.

Ensure business continuity assessments are up to date.

C.

Adjust the organization's risk appetite and tolerance.

D.

Obtain certification to a global information security standard.

Full Access
Question # 343

Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?

A.

SWOT analysis

B.

Business impact analysis (BIA)

C.

Cost-benefit analysis

D.

Root cause analysis

Full Access
Question # 344

Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?

A.

Recovery time objective (RTO)

B.

Cost-benefit analysis

C.

Business impact analysis (BIA)

D.

Cyber insurance coverage

Full Access
Question # 345

An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:

A.

The region in which the organization operates.

B.

Established business culture.

C.

Risk appetite set by senior management.

D.

Identified business process controls.

Full Access
Question # 346

Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?

A.

Cloud service provider

B.

IT department

C.

Senior management

D.

Business unit owner

Full Access
Question # 347

Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:

A.

Line management

B.

The IT risk function

C.

Enterprise compliance

D.

Internal audit

Full Access
Question # 348

Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?

A.

Published vulnerabilities relevant to the business

B.

Threat actors that can trigger events

C.

Events that could potentially impact the business

D.

IT assets requiring the greatest investment

Full Access
Question # 349

An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?

A.

Qualitative method

B.

Industry calibration method

C.

Threat-based method

D.

Quantitative method

Full Access
Question # 350

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

A.

Implement compensating controls until the preferred action can be completed.

B.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.

C.

Replace the action owner with a more experienced individual.

D.

Change the risk response strategy of the relevant risk to risk avoidance.

Full Access
Question # 351

A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:

A.

Aligned with risk management capabilities.

B.

Based on industry trends.

C.

Related to probable events.

D.

Mapped to incident response plans.

Full Access
Question # 352

Which of the following should be the PRIMARY driver for the prioritization of risk responses?

A.

Residual risk

B.

Risk appetite

C.

Mitigation cost

D.

Inherent risk

Full Access
Question # 353

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Establishing a series of key risk indicators (KRIs).

B.

Adding risk triggers to entries in the risk register.

C.

Implementing key performance indicators (KPIs).

D.

Developing contingency plans for key processes.

Full Access
Question # 354

The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:

A.

results of a business impact analysis (BIA).

B.

the original risk response plan.

C.

training program and user awareness documentation.

D.

a post-implementation risk and control self-assessment (RCSA).

Full Access
Question # 355

Which of the following BEST enables an organization to address risk associated with technical complexity?

A.

Documenting system hardening requirements

B.

Minimizing dependency on technology

C.

Aligning with a security architecture

D.

Establishing configuration guidelines

Full Access
Question # 356

Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?

A.

The policy lacks specifics on how to secure the organization's systems from cyberattacks.

B.

The policy has gaps against relevant cybersecurity standards and frameworks.

C.

The policy has not been reviewed by the cybersecurity team in over a year.

D.

The policy has not been approved by the organization's board.

Full Access
Question # 357

Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?

A.

Internet of Things (IoT)

B.

Quantum computing

C.

Virtual reality (VR)

D.

Machine learning

Full Access
Question # 358

A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?

A.

A post-implementation review has been conducted by key personnel.

B.

A qualified independent party assessed the new controls as effective.

C.

Senior management has signed off on the design of the controls.

D.

Robots have operated without human interference on a daily basis.

Full Access
Question # 359

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

Full Access
Question # 360

Which of the following is a PRIMARY reason for considering existing controls during initial risk assessment?

A.

To determine the inherent risk level

B.

To determine the acceptable risk level

C.

To determine the current risk level

D.

To determine the desired risk level

Full Access
Question # 361

Which of the following would BEST facilitate the maintenance of data classification requirements?

A.

Scheduling periodic audits

B.

Assigning a data custodian

C.

Implementing technical controls over the assets

D.

Establishing a data loss prevention (DLP) solution

Full Access
Question # 362

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?

A.

Impact of risk occurrence

B.

Frequency of risk occurrence

C.

Cost of risk response

D.

Legal aspects of risk realization

Full Access
Question # 363

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

A.

Average time to implement patches after vendor release

B.

Number of patches tested prior to deployment

C.

Increase in the frequency of patches deployed into production

D.

Percent of patches implemented within established timeframe

Full Access
Question # 364

If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?

A.

Confidentiality

B.

Accountability

C.

Availability

D.

Integrity

Full Access
Question # 365

An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on the organization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?

A.

Obfuscate the customers’ personal information.

B.

Require the business partner to delete personal information following the audit.

C.

Use a secure channel to transmit the files.

D.

Ensure the contract includes provisions for sharing personal information.

Full Access
Question # 366

Which of the following events is MOST likely to trigger the need to conduct a risk assessment?

A.

An incident resulting in data loss

B.

Changes in executive management

C.

Updates to the information security policy

D.

Introduction of a new product line

Full Access
Question # 367

A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?

A.

Report the incident.

B.

Plan a security awareness session.

C.

Assess the new risk.

D.

Update the risk register.

Full Access
Question # 368

An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?

A.

Risk profile

B.

Risk tolerance

C.

Risk capacity

D.

Risk appetite

Full Access
Question # 369

Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?

A.

Senior management demonstrates ethics in their day-to-day decision making.

B.

An independent ethics investigation team has been established.

C.

Employees are required to complete ethics training courses annually.

D.

The risk practitioner is required to consult with the ethics committee.

Full Access
Question # 370

Which of the following BEST indicates the effective implementation of a risk treatment plan?

A.

Inherent risk is managed within an acceptable level.

B.

Residual risk is managed within appetite and tolerance.

C.

Risk treatments are aligned with industry peers.

D.

Key controls are identified and documented.

Full Access
Question # 371

Which of the following is the MOST useful input when developing risk scenarios?

A.

Common attacks in other industries.

B.

Identification of risk events.

C.

Impact on critical assets.

D.

Probability of disruptive risk events.

Full Access
Question # 372

Which of the following BEST enables detection of ethical violations committed by employees?

A.

Transaction log monitoring

B.

Access control attestation

C.

Periodic job rotation

D.

Whistleblower program

Full Access
Question # 373

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

A.

Conduct risk classification for associated IT controls.

B.

Determine whether risk responses still effectively address risk.

C.

Perform vulnerability and threat assessments.

D.

Analyze and update IT control assessments.

Full Access
Question # 374

Which of the following is the BEST way to mitigate the risk associated with fraudulent use of an enterprise's brand on Internet sites?

A.

Utilizing data loss prevention (DLP) technology

B.

Monitoring the enterprise's use of the Internet

C.

Scanning the Internet to search for unauthorized usage

D.

Developing training and awareness campaigns

Full Access
Question # 375

Which of the following should be the PRIMARY input to determine risk tolerance?

A.

Regulatory requirements

B.

Organizational objectives

C.

Annual loss expectancy (ALE)

D.

Risk management costs

Full Access
Question # 376

During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:

A.

Interviewing data owners

B.

Reviewing risk response plans with internal audit

C.

Developing a risk monitoring process

D.

Reviewing an external risk assessment

Full Access
Question # 377

Which of the following is the MOST important consideration when prioritizing risk response?

A.

Requirements for regulatory obligations

B.

Cost of control implementation

C.

Effectiveness of risk treatment

D.

Number of risk response options

Full Access
Question # 378

Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

A.

To ensure IT risk management is focused on mitigating emerging risk

B.

To confirm that IT risk assessment results are expressed in quantitative terms

C.

To evaluate threats to the organization's operations and strategy

D.

To identify gaps in the alignment of IT risk management processes and strategy

Full Access
Question # 379

Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?

A.

Inherent risk and likelihood

B.

Management action plans associated with audit findings

C.

Residual risk relative to appetite and tolerance

D.

Key risk indicator (KRI) trends

Full Access
Question # 380

During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?

A.

Describe IT risk scenarios in terms of business risk.

B.

Recommend the formation of an executive risk council to oversee IT risk.

C.

Provide an estimate of IT system downtime if IT risk materializes.

D.

Educate business executives on IT risk concepts.

Full Access
Question # 381

Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?

A.

Obtaining logs m an easily readable format

B.

Providing accurate logs m a timely manner

C.

Collecting logs from the entire set of IT systems

D.

implementing an automated log analysis tool

Full Access
Question # 382

A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?

A.

Risk likelihood

B.

Risk velocity

C.

Risk appetite

D.

Risk impact

Full Access
Question # 383

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

A.

Cost of offsite backup premises

B.

Cost of downtime due to a disaster

C.

Cost of testing the business continuity plan

D.

Response time of the emergency action plan

Full Access
Question # 384

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Full Access
Question # 385

During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?

A.

Monitoring

B.

Development

C.

Implementation

D.

Initiation

Full Access
Question # 386

Which of the following is a specific concern related to machine learning algorithms?

A.

Low software quality

B.

Lack of access controls

C.

Data breaches

D.

Data bias

Full Access
Question # 387

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

A.

requirements of management.

B.

specific risk analysis framework being used.

C.

organizational risk tolerance

D.

results of the risk assessment.

Full Access
Question # 388

Which of the following is the MOST important factor affecting risk management in an organization?

A.

The risk manager's expertise

B.

Regulatory requirements

C.

Board of directors' expertise

D.

The organization's culture

Full Access
Question # 389

Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?

A.

Control chart

B.

Sensitivity analysis

C.

Trend analysis

D.

Decision tree

Full Access
Question # 390

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

A.

reduces risk to an acceptable level

B.

quantifies risk impact

C.

aligns with business strategy

D.

advances business objectives.

Full Access
Question # 391

Which of the following will BEST mitigate the risk associated with IT and business misalignment?

A.

Establishing business key performance indicators (KPIs)

B.

Introducing an established framework for IT architecture

C.

Establishing key risk indicators (KRIs)

D.

Involving the business process owner in IT strategy

Full Access
Question # 392

Which of the following is the MOST important characteristic of an effective risk management program?

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Full Access
Question # 393

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Full Access
Question # 394

Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?

A.

Number of tickets for provisioning new accounts

B.

Average time to provision user accounts

C.

Password reset volume per month

D.

Average account lockout time

Full Access
Question # 395

After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:

A.

recommend a program that minimizes the concerns of that production system.

B.

inform the development team of the concerns, and together formulate risk reduction measures.

C.

inform the process owner of the concerns and propose measures to reduce them

D.

inform the IT manager of the concerns and propose measures to reduce them.

Full Access
Question # 396

Which of the following would BEST help minimize the risk associated with social engineering threats?

A.

Enforcing employees’ sanctions

B.

Conducting phishing exercises

C.

Enforcing segregation of dunes

D.

Reviewing the organization's risk appetite

Full Access
Question # 397

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

A.

Increase in the frequency of changes

B.

Percent of unauthorized changes

C.

Increase in the number of emergency changes

D.

Average time to complete changes

Full Access
Question # 398

In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?

A.

The control catalog

B.

The asset profile

C.

Business objectives

D.

Key risk indicators (KRls)

Full Access
Question # 399

Which of the following would be considered a vulnerability?

A.

Delayed removal of employee access

B.

Authorized administrative access to HR files

C.

Corruption of files due to malware

D.

Server downtime due to a denial of service (DoS) attack

Full Access
Question # 400

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

A.

Perform annual risk assessments.

B.

Interview process owners.

C.

Review the risk register.

D.

Analyze key performance indicators (KPIs).

Full Access
Question # 401

To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?

A.

Threshold definition

B.

Escalation procedures

C.

Automated data feed

D.

Controls monitoring

Full Access
Question # 402

The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:

A.

implement uniform controls for common risk scenarios.

B.

ensure business unit risk is uniformly distributed.

C.

build a risk profile for management review.

D.

quantify the organization's risk appetite.

Full Access
Question # 403

A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?

A.

The underlying data source for the KRI is using inaccurate data and needs to be corrected.

B.

The KRI is not providing useful information and should be removed from the KRI inventory.

C.

The KRI threshold needs to be revised to better align with the organization s risk appetite

D.

Senior management does not understand the KRI and should undergo risk training.

Full Access
Question # 404

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

A.

Logs and system events

B.

Intrusion detection system (IDS) rules

C.

Vulnerability assessment reports

D.

Penetration test reports

Full Access
Question # 405

Which of the following risk register updates is MOST important for senior management to review?

A.

Extending the date of a future action plan by two months

B.

Retiring a risk scenario no longer used

C.

Avoiding a risk that was previously accepted

D.

Changing a risk owner

Full Access
Question # 406

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

A.

Invoke the disaster recovery plan during an incident.

B.

Prepare a cost-benefit analysis of alternatives available

C.

Implement redundant infrastructure for the application.

D.

Reduce the recovery time by strengthening the response team.

Full Access
Question # 407

Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?

A.

Ensuring availability of resources for log analysis

B.

Implementing log analysis tools to automate controls

C.

Ensuring the control is proportional to the risk

D.

Building correlations between logs collected from different sources

Full Access
Question # 408

Which of the following is the PRIMARY reason to perform ongoing risk assessments?

A.

Emerging risk must be continuously reported to management.

B.

New system vulnerabilities emerge at frequent intervals.

C.

The risk environment is subject to change.

D.

The information security budget must be justified.

Full Access
Question # 409

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 410

During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?

A.

Escalate the non-cooperation to management

B.

Exclude applicable controls from the assessment.

C.

Review the supplier's contractual obligations.

D.

Request risk acceptance from the business process owner.

Full Access
Question # 411

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

A.

Collecting data for IT risk assessment

B.

Establishing and communicating the IT risk profile

C.

Utilizing a balanced scorecard

D.

Performing and publishing an IT risk analysis

Full Access
Question # 412

Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?

A.

Recovery time objectives (RTOs)

B.

Segregation of duties

C.

Communication plan

D.

Critical asset inventory

Full Access
Question # 413

Effective risk communication BEST benefits an organization by:

A.

helping personnel make better-informed decisions

B.

assisting the development of a risk register.

C.

improving the effectiveness of IT controls.

D.

increasing participation in the risk assessment process.

Full Access
Question # 414

What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?

A.

Segment the system on its own network.

B.

Ensure regular backups take place.

C.

Virtualize the system in the cloud.

D.

Install antivirus software on the system.

Full Access
Question # 415

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs provide an early warning that a risk threshold is about to be reached.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization.

D.

KRIs assist in the preparation of the organization's risk profile.

Full Access
Question # 416

An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?

A.

Perform a cost-benefit analysis.

B.

Conduct a SWOT analysis.

C.

Provide data on the number of risk events from the last year.

D.

Report on recent losses experienced by industry peers.

Full Access
Question # 417

Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?

A.

Optimize the control environment.

B.

Realign risk appetite to the current risk level.

C.

Decrease the number of related risk scenarios.

D.

Reduce the risk management budget.

Full Access
Question # 418

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Full Access
Question # 419

Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?

A.

Completeness of system documentation

B.

Results of end user acceptance testing

C.

Variances between planned and actual cost

D.

availability of in-house resources

Full Access
Question # 420

A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?

A.

Business continuity manager (BCM)

B.

Human resources manager (HRM)

C.

Chief risk officer (CRO)

D.

Chief information officer (CIO)

Full Access
Question # 421

Which of the following is the MAIN reason to continuously monitor IT-related risk?

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Full Access
Question # 422

IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would

be MOST helpful?

A.

IT risk register

B.

List of key risk indicators

C.

Internal audit reports

D.

List of approved projects

Full Access
Question # 423

Which of the following controls would BEST reduce the risk of account compromise?

A.

Enforce password changes.

B.

Enforce multi-factor authentication (MFA).

C.

Enforce role-based authentication.

D.

Enforce password encryption.

Full Access
Question # 424

The MAIN purpose of conducting a control self-assessment (CSA) is to:

A.

gain a better understanding of the control effectiveness in the organization

B.

gain a better understanding of the risk in the organization

C.

adjust the controls prior to an external audit

D.

reduce the dependency on external audits

Full Access
Question # 425

From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

A.

The organization gains assurance it can recover from a disaster

B.

Errors are discovered in the disaster recovery process.

C.

All business-critical systems are successfully tested.

D.

All critical data is recovered within recovery time objectives (RTOs).

Full Access
Question # 426

Who is the MOST appropriate owner for newly identified IT risk?

A.

The manager responsible for IT operations that will support the risk mitigation efforts

B.

The individual with authority to commit organizational resources to mitigate the risk

C.

A project manager capable of prioritizing the risk remediation efforts

D.

The individual with the most IT risk-related subject matter knowledge

Full Access
Question # 427

A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?

A.

Risk impact

B.

Risk trend

C.

Risk appetite

D.

Risk likelihood

Full Access
Question # 428

Which of the following is MOST helpful when determining whether a system security control is effective?

A.

Control standard operating procedures

B.

Latest security assessment

C.

Current security threat report

D.

Updated risk register

Full Access
Question # 429

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Full Access
Question # 430

Which of the following is the MOST effective key performance indicator (KPI) for change management?

A.

Percentage of changes with a fallback plan

B.

Number of changes implemented

C.

Percentage of successful changes

D.

Average time required to implement a change

Full Access
Question # 431

An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?

A.

Employ security guards.

B.

Conduct security awareness training.

C.

Install security cameras.

D.

Require security access badges.

Full Access
Question # 432

Establishing and organizational code of conduct is an example of which type of control?

A.

Preventive

B.

Directive

C.

Detective

D.

Compensating

Full Access
Question # 433

It is MOST appropriate for changes to be promoted to production after they are:

A.

communicated to business management

B.

tested by business owners.

C.

approved by the business owner.

D.

initiated by business users.

Full Access
Question # 434

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

A.

Continuous monitoring

B.

A control self-assessment

C.

Transaction logging

D.

Benchmarking against peers

Full Access
Question # 435

Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?

A.

Establish a cyber response plan

B.

Implement data loss prevention (DLP) tools.

C.

Implement network segregation.

D.

Strengthen vulnerability remediation efforts.

Full Access
Question # 436

Which of the following is the MOST important consideration when developing an organization's risk taxonomy?

A.

Leading industry frameworks

B.

Business context

C.

Regulatory requirements

D.

IT strategy

Full Access
Question # 437

Which of the following would be MOST helpful when estimating the likelihood of negative events?

A.

Business impact analysis

B.

Threat analysis

C.

Risk response analysis

D.

Cost-benefit analysis

Full Access
Question # 438

The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

A.

align with audit results.

B.

benchmark with competitor s actions.

C.

reference best practice.

D.

focus on the business drivers

Full Access
Question # 439

Risk mitigation procedures should include:

A.

buying an insurance policy.

B.

acceptance of exposures

C.

deployment of counter measures.

D.

enterprise architecture implementation.

Full Access
Question # 440

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

A.

Risk appetite statement

B.

Enterprise risk management framework

C.

Risk management policies

D.

Risk register

Full Access
Question # 441

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?

A.

Number of users that participated in the DRP testing

B.

Number of issues identified during DRP testing

C.

Percentage of applications that met the RTO during DRP testing

D.

Percentage of issues resolved as a result of DRP testing

Full Access
Question # 442

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

A.

chief risk officer.

B.

project manager.

C.

chief information officer.

D.

business process owner.

Full Access
Question # 443

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Full Access
Question # 444

Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?

A.

The number of security incidents escalated to senior management

B.

The number of resolved security incidents

C.

The number of newly identified security incidents

D.

The number of recurring security incidents

Full Access
Question # 445

Which of the following attributes of a key risk indicator (KRI) is MOST important?

A.

Repeatable

B.

Automated

C.

Quantitative

D.

Qualitative

Full Access
Question # 446

Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

A.

Vulnerability and threat analysis

B.

Control remediation planning

C.

User acceptance testing (UAT)

D.

Control self-assessment (CSA)

Full Access
Question # 447

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Full Access
Question # 448

The risk associated with an asset before controls are applied can be expressed as:

A.

a function of the likelihood and impact

B.

the magnitude of an impact

C.

a function of the cost and effectiveness of control.

D.

the likelihood of a given threat

Full Access
Question # 449

An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:

A.

transferred

B.

mitigated.

C.

accepted

D.

avoided

Full Access
Question # 450

The PRIMARY advantage of implementing an IT risk management framework is the:

A.

establishment of a reliable basis for risk-aware decision making.

B.

compliance with relevant legal and regulatory requirements.

C.

improvement of controls within the organization and minimized losses.

D.

alignment of business goals with IT objectives.

Full Access
Question # 451

The MOST effective way to increase the likelihood that risk responses will be implemented is to:

A.

create an action plan

B.

assign ownership

C.

review progress reports

D.

perform regular audits.

Full Access
Question # 452

Who should be accountable for ensuring effective cybersecurity controls are established?

A.

Risk owner

B.

Security management function

C.

IT management

D.

Enterprise risk function

Full Access
Question # 453

Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?

A.

Derive scenarios from IT risk policies and standards.

B.

Map scenarios to a recognized risk management framework.

C.

Gather scenarios from senior management.

D.

Benchmark scenarios against industry peers.

Full Access
Question # 454

The MOST important characteristic of an organization s policies is to reflect the organization's:

A.

risk assessment methodology.

B.

risk appetite.

C.

capabilities

D.

asset value.

Full Access
Question # 455

Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?

A.

Closed management action plans from the previous audit

B.

Annual risk assessment results

C.

An updated vulnerability management report

D.

A list of identified generic risk scenarios

Full Access
Question # 456

Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?

A.

Sensitivity analysis

B.

Level of residual risk

C.

Cost-benefit analysis

D.

Risk appetite

Full Access
Question # 457

A contract associated with a cloud service provider MUST include:

A.

ownership of responsibilities.

B.

a business recovery plan.

C.

provision for source code escrow.

D.

the providers financial statements.

Full Access
Question # 458

Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?

A.

To build an organizational risk-aware culture

B.

To continuously improve risk management processes

C.

To comply with legal and regulatory requirements

D.

To identify gaps in risk management practices

Full Access
Question # 459

Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?

A.

Emphasizing risk in the risk profile that is related to critical business activities

B.

Customizing the presentation of the risk profile to the intended audience

C.

Including details of risk with high deviation from the risk appetite

D.

Providing information on the efficiency of controls for risk mitigation

Full Access
Question # 460

During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?

A.

Data validation

B.

Identification

C.

Authentication

D.

Data integrity

Full Access
Question # 461

A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?

A.

invoke the established incident response plan.

B.

Inform internal audit.

C.

Perform a root cause analysis

D.

Conduct an immediate risk assessment

Full Access
Question # 462

An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.

A.

The risk owner who also owns the business service enabled by this infrastructure

B.

The data center manager who is also employed under the managed hosting services contract

C.

The site manager who is required to provide annual risk assessments under the contract

D.

The chief information officer (CIO) who is responsible for the hosted services

Full Access
Question # 463

A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

A.

a root cause analysis is required

B.

controls are effective for ensuring continuity

C.

hardware needs to be upgraded

D.

no action is required as there was no impact

Full Access
Question # 464

Which of the following provides the BEST evidence of the effectiveness of an organization's account provisioning process?

A.

User provisioning

B.

Role-based access controls

C.

Security log monitoring

D.

Entitlement reviews

Full Access
Question # 465

Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?

A.

Changes in control design

B.

A decrease in the number of key controls

C.

Changes in control ownership

D.

An increase in residual risk

Full Access
Question # 466

Which of the following is the BEST method for assessing control effectiveness?

A.

Ad hoc control reporting

B.

Control self-assessment

C.

Continuous monitoring

D.

Predictive analytics

Full Access
Question # 467

Which of the following is the MOST important element of a successful risk awareness training program?

A.

Customizing content for the audience

B.

Providing incentives to participants

C.

Mapping to a recognized standard

D.

Providing metrics for measurement

Full Access
Question # 468

Which of the following would BEST help an enterprise prioritize risk scenarios?

A.

Industry best practices

B.

Placement on the risk map

C.

Degree of variances in the risk

D.

Cost of risk mitigation

Full Access
Question # 469

Which of the following is MOST important to understand when determining an appropriate risk assessment approach?

A.

Complexity of the IT infrastructure

B.

Value of information assets

C.

Management culture

D.

Threats and vulnerabilities

Full Access
Question # 470

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

A.

Risk questionnaire

B.

Risk register

C.

Management assertion

D.

Compliance manual

Full Access
Question # 471

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Full Access
Question # 472

Which of the following is MOST important to identify when developing generic risk scenarios?

A.

The organization’s vision and mission

B.

Resources required for risk mitigation

C.

Impact to business objectives

D.

Risk-related trends within the industry

Full Access
Question # 473

Which of the following controls will BEST detect unauthorized modification of data by a database administrator?

A.

Reviewing database access rights

B.

Reviewing database activity logs

C.

Comparing data to input records

D.

Reviewing changes to edit checks

Full Access
Question # 474

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

A.

Key risk indicators (KRls)

B.

Inherent risk

C.

Residual risk

D.

Risk appetite

Full Access