Which of the following is MOST likely to expose an organization to adverse threats?
Which of the following risk response strategies involves the implementation of new controls?
Which of the following is the MOST important aspect of key performance indicators (KPIs)?
Which of the following represents a vulnerability associated with legacy systems using older technology?
Which of the following is MOST important for the determination of I&T-related risk?
Which of the following is MOST important when defining an organization's risk scope?
Which of the following provides the BEST input when developing specific, measurable, realistic, and time-bound (SMART) metrics?
Which of the following should be found in an I&T asset inventory to help inform the risk identification process?
Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?
As part of the control monitoring process, frequent control exceptions are MOST likely to indicate:
An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?
What is the PRIMARY purpose of providing timely and accurate risk information to key stakeholders?
Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?
Which of the following MUST be established in order to manage l&T-related risk throughout the enterprise?
Which of the following is of GREATEST concern when aggregating risk information in management reports?
What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?
Which of the following is the MOST important factor to consider when developing effective risk scenarios?
Key risk indicators (KRIs) are used for which of the following purposes when developing a project plan?
Which of the following presents the GREATEST risk for the continued existence of an enterprise?
Which of the following is an example of an inductive method to gather information?
When determining the criticality of I&T assets, it is MOST important to identify:
Which of the following is combined with risk impact to determine the level of risk?
A risk practitioner has been tasked with analyzing new risk events added to the risk register. Which of the following analysis methods would BEST enable the risk practitioner to minimize ambiguity and subjectivity?
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
As part of an I&T related risk assessment, which of the following should be reviewed to obtain an initial view of overall I&T related risk for the enterprise?