Which of the following is the MOST important driver of an effective enterprise risk management (ERM) program?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
To enable effective integration of IT risk scenarios and ERM, it is MOST important to have a consistent approach to reporting:
Automated code reviews to reduce the risk associated with web applications are MOST effective when performed:
Which of The following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?
A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
Which of the following is the MOST effective way to integrate risk and compliance management?
Which of the following should be the starting point when performing a risk analysis for an asset?
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
Which of the following is the MOST important consideration when developing risk strategies?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:
Which of the following is the BEST approach for obtaining management buy-in
to implement additional IT controls?
An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?
Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?
Which of the following is a risk practitioner's MOST important course of action when the level of risk has exceeded risk tolerance?
The MOST important consideration when selecting a control to mitigate an identified risk is whether:
Which of the following BEST supports the communication of risk assessment results to stakeholders?
An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?
The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:
Which of the following is the PRIMARY role of a data custodian in the risk management process?
To help ensure the success of a major IT project, it is MOST important to:
An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?
An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''
Which of the following is the BEST way to manage the risk associated with malicious activities performed by database administrators (DBAs)?
A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?
An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?
Which of the following would provide the MOST comprehensive information for updating an organization's risk register?
Which of the following is MOST helpful when prioritizing action plans for identified risk?
Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
Which of the following is the MOST important outcome of reviewing the risk management process?
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following is the MOST significant indicator of the need to perform a penetration test?
Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
Which of the following is the MOST appropriate key control indicator (KCI) to help an organization prevent successful cyber risk events on the external-facing infrastructure?
Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?
Which of the following is the MOST important reason to create risk scenarios?
Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?
An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:
When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:
Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?
A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner
recommend be done NEXT?
Which of the following provides the MOST useful information to determine risk exposure following control implementations?
In order to determining a risk is under-controlled the risk practitioner will need to
Which of the following is the BEST indication of the effectiveness of a business continuity program?
Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
A trusted third-party service provider has determined that the risk of a client's systems being hacked is low. Which of the following would be the client's BEST course of action?
Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following is the BEST way for an organization to enable risk treatment decisions?
Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?
Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following is the GREATEST risk associated with the misclassification of data?
An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?
Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?
An organization recently implemented a cybersecurity awareness program that includes phishing simul-ation exercises for all employees. What type of control is being utilized?
Which of the following would BEST facilitate the implementation of data classification requirements?
When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?
An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?
A risk practitioner has been asked to mark an identified control deficiency as remediated, despite concerns that the risk level is still too high. Which of the following is the BEST way to address this concern?
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
Which of the following is the MOST important reason to report on changes or trends related to an organization's IT risk profile?
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?
Which of the following provides the MOST useful information when measuring the progress of risk response action plans?
When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?
Which of the following is MOST important when developing key risk indicators (KRIs)?
Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
Which of the blowing is MOST important when implementing an organization s security policy?
An organization recently implemented an extensive risk awareness program after a cybersecurity incident. Which of the following is MOST likely to be affected by the implementation of the program?
Which of the following is the BEST method for assessing control effectiveness?
An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on theorganization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?
Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
Which of the following BEST enables the integration of IT risk management across an organization?
An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?
Which of the following BEST reduces the risk associated with the theft of a laptop containing sensitive information?
Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?
Which of the following would offer the MOST insight with regard to an organization's risk culture?
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
Which types of controls are BEST used to minimize the risk associated with a vulnerability?
When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?
Which of the following roles should be assigned accountability for monitoring risk levels?
Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
Which of the following would BEST ensure that identified risk scenarios are addressed?
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:
During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?
When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?
Which of the following should be the HIGHEST priority when developing a risk response?
What is the PRIMARY reason to periodically review key performance indicators (KPIs)?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
During an IT department reorganization, the manager of a risk mitigation action plan was replaced. The new manager has begun implementing a new control after identifying a more effective option. Which of the following is the risk practitioner's BEST course of action?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
Which of the following activities should only be performed by the third line of defense?
Which of the following is MOST important to ensure before using risk reports in decision making?
A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
Which of the following BEST helps to identify significant events that could impact an organization?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following provides The MOST useful information when determining a risk management program's maturity level?
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
What are the MOST essential attributes of an effective Key control indicator (KCI)?
Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?
Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?
Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
When of the following 15 MOST important when developing a business case for a proposed security investment?
An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:
Which of the following BEST balances the costs and benefits of managing IT risk*?
An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?
Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?
An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?
Which of the following is MOST important when creating a program to reduce ethical risk?
A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
Which of the following is the BEST metric to measure employee adherence to organizational security policies?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?
An organization has allowed several employees to retire early in order to avoid layoffs Many of these employees have been subject matter experts for critical assets Which type of risk is MOST likely to materialize?
The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Which of the following would be MOST useful to senior management when determining an appropriate risk response?
Which of the following provides the BEST evidence that a selected risk treatment plan is effective?
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?
Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Which of the following is the MOST important course of action for a risk practitioner when reviewing the results of control performance monitoring?
Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
Which of the following is a risk practitioner's BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
Which of the following is the FIRST step when identifying risk items related to a new IT project?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following is the BEST risk management approach for the strategic IT planning process?
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Which of the following is the PRIMARY reason to ensure software engineers test patches before release to the production environment?
The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.

After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Which of the following is a risk practitioner's MOST appropriate course of action upon learning that an organization is not compliant with its patch management policy?
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?
Which of the following will BEST quantify the risk associated with malicious users in an organization?
Which of the following BEST enables detection of ethical violations committed by employees?
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
Management has determined that it will take significant time to remediate exposures in the current IT control environment. Which of the following is the BEST course of action?
An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
A Software as a Service (SaaS) provider has determined that the risk of a client's sensitive data being compromised is low. Which of the following is the client's BEST course of action?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?
Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?
The MAIN purpose of reviewing a control after implementation is to validate that the control:
Which of the following is MOST important for a risk practitioner to verify when periodically reviewing risk response action plans?
Which of the following is MOST important to understand when determining an appropriate risk assessment approach?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?
An insurance company handling sensitive and personal information from its customers receives a large volume of telephone requests and electronic communications daily. Which of the following
is MOST important to include in a risk awareness training session for the customer service department?
Which of the following is the MOST important objective of an enterprise risk management (ERM) program?
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
Within the risk management space, which of the following activities could be
delegated to a cloud service provider?
Which of the following BEST measures the impact of business interruptions caused by an IT service outage?
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?
Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?
Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?
Which of the following should an organization perform to forecast the effects of a disaster?
The purpose of requiring source code escrow in a contractual agreement is to:
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?
Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
Which of the following is the BEST way to mitigate the risk to IT infrastructure availability?
Which of the following provides a risk practitioner with the MOST reliable evidence of a third party's ability to protect the confidentiality of sensitive corporate information?
A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
The risk associated with an asset after controls are applied can be expressed as:
Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?
Which of the following is MOST important for a risk practitioner to review during an IT risk assessment?
Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?
Which of the following BEST ensures that the data feeds used by an organization are complete and accurate?
Which of the following has the GREATEST influence on an organization's risk appetite?
Which of the following is the MOST important consideration when selecting digital signature software?
Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?
A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?
Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?
When establishing an enterprise IT risk management program, it is MOST important to:
An organization recently configured a new business division Which of the following is MOST likely to be affected?
Which of the following is the BEST method to maintain a common view of IT risk within an organization?
A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?
A risk assessment has been completed on an application and reported to the application owner. The report includes validated vulnerability findings that require mitigation. Which of the following should be the NEXT step?
Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Which of the following is MOST important to the successful development of IT risk scenarios?
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:
The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to:
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
Which of the following is MOST important to promoting a risk-aware culture?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Who should be responsible for implementing and maintaining security controls?
Which of the following is the BEST way to validate privileged access to database accounts?
The MOST important reason for implementing change control procedures is to ensure:
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
It is MOST important to the effectiveness of an IT risk management function that the associated processes are:
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
Which of the following is MOST important for senior management to review during an acquisition?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization's data flow model?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach
Recent penetration testing of an organization's software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?
A risk manager has determined there is excessive risk with a particular technology. Who is the BEST person to own the unmitigated risk of the technology?
Who should be responsible (of evaluating the residual risk after a compensating control has been
Which of the following BEST enforces access control for an organization that uses multiple cloud technologies?
An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Which of the following is MOST important to determine as a result of a risk assessment?
Which of the following would be MOST helpful when communicating roles associated with the IT risk management process?
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
Which of the following is the GREATEST advantage of implementing a risk management program?
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?
Which of the following should be determined FIRST when a new security vulnerability is made public?
A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?
During the internal review of an accounts payable process, a risk practitioner determines that the transaction approval limits configured in the system are not being enforced. Which of the following should be done NEXT?
Which of the following would BEST facilitate the maintenance of data classification requirements?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:
Which of the following would BEST help identify the owner for each risk scenario in a risk register?
When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner's GREATEST concern?
Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following would BEST prevent an unscheduled application of a patch?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?
Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
Which of the following is the BEST recommendation when a key risk indicator (KRI) is generating an excessive volume of events?
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?
A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?
Who should be accountable for ensuring effective cybersecurity controls are established?
When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:
An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:
An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?
Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?
Which of the following is the PRIMARY benefit of consistently recording risk assessment results in the risk register?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?
Within the three lines of defense model, the accountability for the system of internal control resides with:
An organization is considering adopting artificial intelligence (AI). Which of the
following is the risk practitioner's MOST important course of action?
Which of the following is the BEST control to prevent unauthorized access to an organization's critical assets?
Which of the following is the MOST important benefit of implementing a data classification program?
Which of the following is the PRIMARY role of the second line when an IT risk management framework is adopted?
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
Which of the following is a PRIMARY benefit to an organization that is using threat intelligence?
Which of the following is the BEST approach for determining whether a risk action plan is effective?
Which of the following is the PRIMARY reason for a risk practitioner to examine a post-implementation review report for a control automation tool?
Which of the following would BEST support the integrity of online financial transactions?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:
Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?
An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?
Which of the following is the GREATEST impact of implementing a risk mitigation strategy?
Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?
Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?
Which of the following should be the PRIMARY consideration for a startup organization that has decided to adopt externally-sourced security policies?
When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
Which of the following is the MOST valuable data source to support the optimization of an existing key risk indicator (KRI)?
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?
An organization becomes aware that IT security failed to detect a coordinated
cyber attack on its data center. Which of the following is the BEST course of
action?
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?
Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:
Which of the following BEST contributes to the implementation of an effective risk response action plan?
Which of the following would BEST indicate to senior management that IT processes are improving?
What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?
An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?
A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner's GREATEST concern?
Which of the following risk register updates is MOST important for senior management to review?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
A risk register BEST facilitates which of the following risk management functions?
Which of the following BEST supports the management of identified risk scenarios?
Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
Which of the following is the PRIMARY reason that risk management is important in project management?
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?
IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Which of the following is the BEST way to maintain a current list of organizational risk scenarios?
Which of the following BEST enables effective risk-based decision making?
Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Which of the following is MOST important to enable well-informed cybersecurity risk decisions?
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
Which of the following actions should a risk practitioner do NEXT when an increased industry trend of external cyber attacks is identified?
An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
To ensure key risk indicators (KRIs) are effective and meaningful, the KRIs should be aligned to:
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner's NEXT course of action?
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
Which of the following is a crucial component of a key risk indicator (KRI) to ensure appropriate action is taken to mitigate risk?
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Calculation of the recovery time objective (RTO) is necessary to determine the:
Which of the following would BEST help to ensure that suspicious network activity is identified?
What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?
Which of the following is the MOST important information to cover in a business continuity awareness training program for all employees of the organization?
The risk associated with an asset before controls are applied can be expressed as:
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?
Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?
Which of the following BEST indicates the condition of a risk management program?
Which of the following observations from a third-party service provider review would be of GREATEST concern to a risk practitioner?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
Which of the following is the BEST key performance indicator (KPI) for a server patch management process?
Which of the following is the MOST important reason for an organization to regularly assess the design of key risk indicators (KRIs)?
Which of the following is the BEST indication of an effective risk management program?
Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?
A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?
When reviewing management's IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?
In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
Which of the following is the PRIMARY reason to aggregate risk assessment results from different business units?
Which of the following approaches BEST identifies information systems control deficiencies?
Mapping open risk issues to an enterprise risk heat map BEST facilitates:
Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?
A risk practitioner learns of an urgent threat intelligence alert to patch a critical vulnerability identified in the organization's operating system. Which of the following should the risk practitioner do FIRST?
Which process is MOST effective to determine relevance of threats for risk scenarios?
When updating a risk register with the results of an IT risk assessment, the risk practitioner should log:
Which of the following is the PRIMARY role of the first line of defense with respect to information security policies?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?
An organization maintains independent departmental risk registers that are not automatically aggregated. Which of the following is the GREATEST concern?
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
The MOST important characteristic of an organization s policies is to reflect the organization's:
Which of the following is the BEST way to ensure ongoing control effectiveness?
The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?
A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?
Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
When testing the security of an IT system, il is MOST important to ensure that;
Following the implementation of an Internet of Things (loT) solution, a risk practitioner identifies new risk factors with impact to existing controls. Which of the following is MOST important to include in a report to stakeholders?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
Which of the following is the BEST indicator of the effectiveness of a control monitoring program?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
Which of the following will help ensure the elective decision-making of an IT risk management committee?
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?
In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?
A risk practitioner finds that data has been misclassified. Which of the following is the GREATEST concern?
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
Which of the following statements BEST illustrates the relationship between key performance indicators (KPIs) and key control indicators (KCIs)?
Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?
From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:
Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?
Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?
How should an organization approach the retention of data that is no longer needed for business operations?
Which of the following is MOST effective against external threats to an organizations confidential information?
The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
Which of the following BEST enables an organization to determine whether risk management is aligned with its goals and objectives?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
Which of the following is the BEST way to address IT regulatory compliance risk?
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
Which of the following is MOST important when developing key performance indicators (KPIs)?
An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?
Which of the following BEST enables the identification of trends in risk levels?