Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CRISC

CRISC Certified in Risk and Information Systems Control Question and Answers

Question # 4

A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?

A.

Risk forecasting

B.

Risk tolerance

C.

Risk likelihood

D.

Risk appetite

Full Access
Question # 5

Which of the following is MOST essential for an effective change control environment?

A.

Business management approval of change requests

B.

Separation of development and production environments

C.

Requirement of an implementation rollback plan

D.

IT management review of implemented changes

Full Access
Question # 6

A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?

A.

Add a digital certificate

B.

Apply multi-factor authentication

C.

Add a hash to the message

D.

Add a secret key

Full Access
Question # 7

Which of the following would prompt changes in key risk indicator {KRI) thresholds?

A.

Changes to the risk register

B.

Changes in risk appetite or tolerance

C.

Modification to risk categories

D.

Knowledge of new and emerging threats

Full Access
Question # 8

Which of the following should be the PRIMARY focus of an independent review of a risk management process?

A.

Accuracy of risk tolerance levels

B.

Consistency of risk process results

C.

Participation of stakeholders

D.

Maturity of the process

Full Access
Question # 9

To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?

A.

business owner

B.

IT department

C.

Risk manager

D.

Third-party provider

Full Access
Question # 10

Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?

A.

Chief financial officer

B.

Information security director

C.

Internal audit director

D.

Chief information officer

Full Access
Question # 11

The BEST way to demonstrate alignment of the risk profile with business objectives is through:

A.

risk scenarios.

B.

risk tolerance.

C.

risk policy.

D.

risk appetite.

Full Access
Question # 12

A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?

A.

Protect sensitive information with access controls.

B.

Implement a data loss prevention (DLP) solution.

C.

Re-communicate the data protection policy.

D.

Implement a data encryption solution.

Full Access
Question # 13

Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?

A.

The outsourcing of related IT processes

B.

Outcomes of periodic risk assessments

C.

Changes in service level objectives

D.

Findings from continuous monitoring

Full Access
Question # 14

After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?

A.

Escalate the issue to the service provider.

B.

Re-certify the application access controls.

C.

Remove the developer's access.

D.

Review the results of pre-migration testing.

Full Access
Question # 15

An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?

A.

Communicate sanctions for policy violations to all staff.

B.

Obtain signed acceptance of the new policy from employees.

C.

Train all staff on relevant information security best practices.

D.

Implement data loss prevention (DLP) within the corporate network.

Full Access
Question # 16

In the three lines of defense model, a PRIMARY objective of the second line is to:

A.

Review and evaluate the risk management program.

B.

Ensure risk and controls are effectively managed.

C.

Implement risk management policies regarding roles and responsibilities.

D.

Act as the owner for any operational risk identified as part of the risk program.

Full Access
Question # 17

An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?

A.

IT infrastructure head

B.

Human resources head

C.

Supplier management head

D.

Application development head

Full Access
Question # 18

Who is accountable for risk treatment?

A.

Enterprise risk management team

B.

Risk mitigation manager

C.

Business process owner

D.

Risk owner

Full Access
Question # 19

Mapping open risk issues to an enterprise risk heat map BEST facilitates:

A.

risk response.

B.

control monitoring.

C.

risk identification.

D.

risk ownership.

Full Access
Question # 20

Which of the following is the MAIN reason for analyzing risk scenarios?

A.

Identifying additional risk scenarios

B.

Updating the heat map

C.

Assessing loss expectancy

D.

Establishing a risk appetite

Full Access
Question # 21

Which of the following is the MOST important reason to revisit a previously accepted risk?

A.

To update risk ownership

B.

To review the risk acceptance with new stakeholders

C.

To ensure risk levels have not changed

D.

To ensure controls are still operating effectively

Full Access
Question # 22

Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?

A.

Providing oversight of risk management processes

B.

Implementing processes to detect and deter fraud

C.

Ensuring that risk and control assessments consider fraud

D.

Monitoring the results of actions taken to mitigate fraud

Full Access
Question # 23

Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?

A.

Review vendors' internal risk assessments covering key risk and controls.

B.

Obtain independent control reports from high-risk vendors.

C.

Review vendors performance metrics on quality and delivery of processes.

D.

Obtain vendor references from third parties.

Full Access
Question # 24

The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:

A.

rectify errors in results of KRIs.

B.

detect changes in the risk profile.

C.

reduce costs of risk mitigation controls.

D.

continually improve risk assessments.

Full Access
Question # 25

Within the three lines of defense model, the accountability for the system of internal control resides with:

A.

the chief information officer (CIO).

B.

the board of directors

C.

enterprise risk management

D.

the risk practitioner

Full Access
Question # 26

Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?

A.

Adoption of industry best practices

B.

Involvement of stakeholders in risk assessment

C.

Review of risk scenarios by independent parties

D.

Documentation of potential risk in business cases

Full Access
Question # 27

A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner's BEST course of action?

A.

Determine changes in the risk level.

B.

Outsource the vulnerability management process.

C.

Review the patch management process.

D.

Add agenda item to the next risk committee meeting.

Full Access
Question # 28

Which of the following should be the PRIMARY objective of a risk awareness training program?

A.

To enable risk-based decision making

B.

To promote awareness of the risk governance function

C.

To clarify fundamental risk management principles

D.

To ensure sufficient resources are available

Full Access
Question # 29

Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?

A.

Updating the threat inventory with new threats

B.

Automating log data analysis

C.

Preventing the generation of false alerts

D.

Determining threshold levels

Full Access
Question # 30

Which of the following is the GREATEST risk associated with the use of data analytics?

A.

Distributed data sources

B.

Manual data extraction

C.

Incorrect data selection

D.

Excessive data volume

Full Access
Question # 31

Of the following, who should be responsible for determining the inherent risk rating of an application?

A.

Application owner

B.

Senior management

C.

Risk practitioner

D.

Business process owner

Full Access
Question # 32

A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?

A.

The alternative site is a hot site with equipment ready to resume processing immediately.

B.

The contingency plan provides for backup media to be taken to the alternative site.

C.

The contingency plan for high priority applications does not involve a shared cold site.

D.

The alternative site does not reside on the same fault to matter how the distance apart.

Full Access
Question # 33

Which of the following BEST enables effective IT control implementation?

A.

Key risk indicators (KRIs)

B.

Documented procedures

C.

Information security policies

D.

Information security standards

Full Access
Question # 34

Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?

A.

Assigning identification dates for risk scenarios in the risk register

B.

Updating impact assessments for risk scenario

C.

Verifying whether risk action plans have been completed

D.

Reviewing key risk indicators (KRIS)

Full Access
Question # 35

The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?

A.

Perform a risk assessment.

B.

Accept the risk of not implementing.

C.

Escalate to senior management.

D.

Update the implementation plan.

Full Access
Question # 36

Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?

A.

Review the vendor selection process and vetting criteria.

B.

Assess whether use of service falls within risk tolerance thresholds.

C.

Establish service level agreements (SLAs) with the vendor.

D.

Check the contract for appropriate security risk and control provisions.

Full Access
Question # 37

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

A.

identifying risk scenarios.

B.

determining the risk strategy.

C.

calculating impact and likelihood.

D.

completing the controls catalog.

Full Access
Question # 38

Which of these documents is MOST important to request from a cloud service

provider during a vendor risk assessment?

A.

Nondisclosure agreement (NDA)

B.

Independent audit report

C.

Business impact analysis (BIA)

D.

Service level agreement (SLA)

Full Access
Question # 39

When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:

A.

that results in a full root cause analysis.

B.

used for verification within the SLA.

C.

that are verified as actual incidents.

D.

resolved within the SLA.

Full Access
Question # 40

Which of the following BEST helps to identify significant events that could impact an organization?

Vulnerability analysis

A.

Control analysis

B.

Scenario analysis

C.

Heat map analysis

Full Access
Question # 41

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

A.

increased inherent risk.

B.

higher risk management cost

C.

decreased residual risk.

D.

lower risk management cost.

Full Access
Question # 42

The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:

A.

the third-party website manager

B.

the business process owner

C.

IT security

D.

the compliance manager

Full Access
Question # 43

An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?

A.

Chief information security officer

B.

Business process owner

C.

Chief risk officer

D.

IT controls manager

Full Access
Question # 44

Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?

A.

Reviewing the organization's policies and procedures

B.

Interviewing groups of key stakeholders

C.

Circulating questionnaires to key internal stakeholders

D.

Accepting IT personnel s view of business issues

Full Access
Question # 45

A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?

A.

The user requirements were not documented.

B.

Payroll files were not under the control of a librarian.

C.

The programmer had access to the production programs.

D.

The programmer did not involve the user in testing.

Full Access
Question # 46

Which of the following is the MOST important data attribute of key risk indicators (KRIs)?

A.

The data is measurable.

B.

The data is calculated continuously.

C.

The data is relevant.

D.

The data is automatically produced.

Full Access
Question # 47

Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?

A.

Interview control owners.

B.

Observe the control enhancements in operation.

C.

Inspect external audit documentation.

D.

Review management's detailed action plans.

Full Access
Question # 48

Which of the following is the MOST relevant information to include in a risk management strategy?

A.

Quantified risk triggers

B.

Cost of controls

C.

Regulatory requirements

D.

Organizational goals

Full Access
Question # 49

A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?

A.

Internal audit

B.

Control owner

C.

Senior management

D.

Risk manager

Full Access
Question # 50

Which of the following would BEST enable a risk practitioner to embed risk management within the organization?

A.

Provide risk management feedback to key stakeholders.

B.

Collect and analyze risk data for report generation.

C.

Monitor and prioritize risk data according to the heat map.

D.

Engage key stakeholders in risk management practices.

Full Access
Question # 51

The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:

A.

ensure policy and regulatory compliance.

B.

assess the proliferation of new threats.

C.

verify Internet firewall control settings.

D.

identify vulnerabilities in the system.

Full Access
Question # 52

An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:

A.

rolled back changes below management's thresholds.

B.

change-related exceptions per month.

C.

the average implementation time for changes.

D.

number of user stories approved for implementation.

Full Access
Question # 53

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

A.

Project sponsor

B.

Process owner

C.

Risk manager

D.

Internal auditor

Full Access
Question # 54

Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?

A.

Insurance coverage

B.

Onsite replacement availability

C.

Maintenance procedures

D.

Installation manuals

Full Access
Question # 55

A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?

A.

Develop a risk action plan to address the findings.

B.

Evaluate the impact of the vulnerabilities to the business application.

C.

Escalate the findings to senior management and internal audit.

D.

Conduct a penetration test to validate the vulnerabilities from the findings.

Full Access
Question # 56

A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:

A.

obtain management approval for policy exception.

B.

develop an improved password software routine.

C.

select another application with strong password controls.

D.

continue the implementation with no changes.

Full Access
Question # 57

Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?

A.

A companion of risk assessment results to the desired state

B.

A quantitative presentation of risk assessment results

C.

An assessment of organizational maturity levels and readiness

D.

A qualitative presentation of risk assessment results

Full Access
Question # 58

Which of the following will provide the BEST measure of compliance with IT policies?

A.

Evaluate past policy review reports.

B.

Conduct regular independent reviews.

C.

Perform penetration testing.

D.

Test staff on their compliance responsibilities.

Full Access
Question # 59

Which of the following conditions presents the GREATEST risk to an application?

A.

Application controls are manual.

B.

Application development is outsourced.

C.

Source code is escrowed.

D.

Developers have access to production environment.

Full Access
Question # 60

Which of the following controls will BEST mitigate risk associated with excessive access privileges?

A.

Review of user access logs

B.

Frequent password expiration

C.

Separation of duties

D.

Entitlement reviews

Full Access
Question # 61

After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?

A.

Accept the risk with management sign-off.

B.

Ignore the risk until the regulatory body conducts a compliance check.

C.

Mitigate the risk with the identified control.

D.

Transfer the risk by buying insurance.

Full Access
Question # 62

Which of the following is MOST important when developing risk scenarios?

A.

The scenarios are based on industry best practice.

B.

The scenarios focus on current vulnerabilities.

C.

The scenarios are relevant to the organization.

D.

The scenarios include technical consequences.

Full Access
Question # 63

Which of the following is the MOST important input when developing risk scenarios?

A.

Key performance indicators

B.

Business objectives

C.

The organization's risk framework

D.

Risk appetite

Full Access
Question # 64

The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to:

A.

establish overall impact to the organization

B.

efficiently manage the scope of the assignment

C.

identify critical information systems

D.

facilitate communication to senior management

Full Access
Question # 65

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?

A.

Frequency of anti-virus software updates

B.

Number of alerts generated by the anti-virus software

C.

Number of false positives detected over a period of time

D.

Percentage of IT assets with current malware definitions

Full Access
Question # 66

A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?

A.

Recommend avoiding the risk.

B.

Validate the risk response with internal audit.

C.

Update the risk register.

D.

Evaluate outsourcing the process.

Full Access
Question # 67

Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?

A.

Business case

B.

Balanced scorecard

C.

Industry standards

D.

Heat map

Full Access
Question # 68

Which of the following would MOST likely result in updates to an IT risk appetite statement?

A.

External audit findings

B.

Feedback from focus groups

C.

Self-assessment reports

D.

Changes in senior management

Full Access
Question # 69

Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?

A.

Review risk tolerance levels

B.

Maintain the current controls.

C.

Analyze the effectiveness of controls.

D.

Execute the risk response plan

Full Access
Question # 70

Mitigating technology risk to acceptable levels should be based PRIMARILY upon:

A.

organizational risk appetite.

B.

business sector best practices.

C.

business process requirements.

D.

availability of automated solutions

Full Access
Question # 71

Which of the following will BEST help to ensure that information system controls are effective?

A.

Responding promptly to control exceptions

B.

Implementing compensating controls

C.

Testing controls periodically

D.

Automating manual controls

Full Access
Question # 72

Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?

A.

Total cost to support the policy

B.

Number of exceptions to the policy

C.

Total cost of policy breaches

D.

Number of inquiries regarding the policy

Full Access
Question # 73

Which of the following provides The MOST useful information when determining a risk management program's maturity level?

A.

Risk assessment results

B.

A recently reviewed risk register

C.

Key performance indicators (KPIs)

D.

The organization's risk framework

Full Access
Question # 74

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

A.

Risk tolerance

B.

Risk appetite

C.

Risk awareness

D.

Risk policy

Full Access
Question # 75

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

A.

risk mitigation approach

B.

cost-benefit analysis.

C.

risk assessment results.

D.

vulnerability assessment results

Full Access
Question # 76

A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?

A.

The administrative access does not allow for activity log monitoring.

B.

The administrative access does not follow password management protocols.

C.

The administrative access represents a deviation from corporate policy.

D.

The administrative access represents a segregation of duties conflict.

Full Access
Question # 77

Which of the following presents the GREATEST concern associated with the

use of artificial intelligence (Al) systems?

A.

Al systems need to be available continuously.

B.

Al systems can be affected by bias.

C.

Al systems are expensive to maintain.

D.

Al systems can provide false positives.

Full Access
Question # 78

Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?

A.

Introducing control procedures early in the life cycle

B.

Implementing loT device software monitoring

C.

Performing periodic risk assessments of loT

D.

Performing secure code reviews

Full Access
Question # 79

Which of the following should be done FIRST when a new risk scenario has been identified

A.

Estimate the residual risk.

B.

Establish key risk indicators (KRIs).

C.

Design control improvements.

D.

Identify the risk owner.

Full Access
Question # 80

Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?

A.

Conducting security awareness training

B.

Updating the information security policy

C.

Implementing mock phishing exercises

D.

Requiring two-factor authentication

Full Access
Question # 81

Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?

A.

To define effective enterprise IT risk appetite and tolerance levels

B.

To execute the IT risk management strategy in support of business objectives

C.

To establish business-aligned IT risk management organizational structures

D.

To assess the capabilities and maturity of the organization’s IT risk management efforts

Full Access
Question # 82

Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?

A.

Re-evaluate current controls.

B.

Revise the current risk action plan.

C.

Escalate the risk to senior management.

D.

Implement additional controls.

Full Access
Question # 83

A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?

A.

Consistent forms to document risk acceptance rationales

B.

Acceptable scenarios to override risk appetite or tolerance thresholds

C.

Individuals or roles authorized to approve risk acceptance

D.

Communication protocols when a risk is accepted

Full Access
Question # 84

Which of the following is the MOST important consideration when prioritizing risk response?

A.

Requirements for regulatory obligations.

B.

Cost of control implementation.

C.

Effectiveness of risk treatment.

D.

Number of risk response options.

Full Access
Question # 85

Which of the following presents the GREATEST privacy risk related to personal data processing for a global organization?

A.

Privacy risk awareness training has not been conducted across the organization.

B.

The organization has not incorporated privacy into its risk management framework.

C.

The organization allows staff with access to personal data to work remotely.

D.

Personal data processing occurs in an offshore location with a data sharing agreement.

Full Access
Question # 86

An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?

A.

Lack of cross-functional risk assessment workshops within the organization

B.

Lack of common understanding of the organization's risk culture

C.

Lack of quantitative methods to aggregate the total risk exposure

D.

Lack of an integrated risk management system to aggregate risk scenarios

Full Access
Question # 87

Which of the following is the BEST method to track asset inventory?

A.

Periodic asset review by management

B.

Asset registration form

C.

Automated asset management software

D.

IT resource budgeting process

Full Access
Question # 88

Which of the following is the GREATEST impact of implementing a risk mitigation strategy?

A.

Improved alignment with business goals.

B.

Reduction of residual risk.

C.

Increased costs due to control implementation.

D.

Decreased overall risk appetite.

Full Access
Question # 89

A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?

A.

Risk impact

B.

Key risk indicator (KRI)

C.

Risk appetite

D.

Risk likelihood

Full Access
Question # 90

Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?

A.

A risk roadmap

B.

A balanced scorecard

C.

A heat map

D.

The risk register

Full Access
Question # 91

Which of the following BEST enables the timely detection of changes in the security control environment?

A.

Control self-assessment (CSA)

B.

Log analysis

C.

Security control reviews

D.

Random sampling checks

Full Access
Question # 92

Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?

A.

internal audit recommendations

B.

Laws and regulations

C.

Policies and procedures

D.

Standards and frameworks

Full Access
Question # 93

Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?

A.

System owner

B.

Internal auditor

C.

Process owner

D.

Risk owner

Full Access
Question # 94

An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?

A.

Risk owner

B.

IT risk manager

C.

Server administrator

D.

Risk practitioner

Full Access
Question # 95

An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?

A.

Most recent IT audit report results

B.

Replacement cost of IT assets

C.

Current annualized loss expectancy report

D.

Cyber insurance industry benchmarking report

Full Access
Question # 96

Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:

A.

line management.

B.

the IT risk function.

C.

enterprise compliance.

D.

internal audit.

Full Access
Question # 97

An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?

A.

Enforce criminal background checks.

B.

Mask customer data fields.

C.

Require vendor to sign a confidentiality agreement.

D.

Restrict access to customer data on a "need to know'' basis.

Full Access
Question # 98

Which of the following is the MOST important consideration when selecting digital signature software?

A.

Availability

B.

Nonrepudiation

C.

Accuracy

D.

Completeness

Full Access
Question # 99

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'

A.

Identify the regulatory bodies that may highlight this gap

B.

Highlight news articles about data breaches

C.

Evaluate the risk as a measure of probable loss

D.

Verify if competitors comply with a similar policy

Full Access
Question # 100

Which of the following is the GREATEST concern if user acceptance testing (UAT) is not conducted when implementing a new application?

A.

The probability of application defects will increase

B.

Data confidentiality could be compromised

C.

Increase in the use of redundant processes

D.

The application could fail to meet defined business requirements

Full Access
Question # 101

Which of the following is the PRIMARY accountability for a control owner?

A.

Communicate risk to senior management.

B.

Own the associated risk the control is mitigating.

C.

Ensure the control operates effectively.

D.

Identify and assess control weaknesses.

Full Access
Question # 102

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Full Access
Question # 103

Which of the following is the MOST important success factor when introducing risk management in an organization?

A.

Implementing a risk register

B.

Defining a risk mitigation strategy and plan

C.

Assigning risk ownership

D.

Establishing executive management support

Full Access
Question # 104

An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?

A.

Include a nondisclosure agreement (NDA) for personal data in the contract.

B.

Implement a digital rights protection tool to monitor data.

C.

Use a virtual private network (VPN) to communicate data.

D.

Transfer a read-only version of the data.

Full Access
Question # 105

If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?

A.

Confidentiality

B.

Accountability

C.

Availability

D.

Integrity

Full Access
Question # 106

Which of the following is the PRIMARY reason for logging in a production database environment?

A.

To provide evidence of activities

B.

To prevent illicit actions of database administrators (DBAs)

C.

To ensure that changes are authorized

D.

To ensure that changes made are correctly applied

Full Access
Question # 107

An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?

A.

Accept the risk of using the production data to ensure accurate results.

B.

Assess the risk of using production data for testing before making a decision.

C.

Benchmark against what peer organizations are doing with POC testing environments.

D.

Deny the request, as production data should not be used for testing purposes.

Full Access
Question # 108

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

A.

To provide a basis for determining the criticality of risk mitigation controls

B.

To provide early warning signs of a potential change in risk level

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide insight into the effectiveness of the intemnal control environment

Full Access
Question # 109

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Full Access
Question # 110

Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?

A.

Transfer the risk.

B.

Perform a gap analysis.

C.

Determine risk appetite for the new regulation.

D.

Implement specific monitoring controls.

Full Access
Question # 111

Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?

A.

Costs and benefits

B.

Local laws and regulations

C.

Security features and support

D.

Business strategies and needs

Full Access
Question # 112

Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?

A.

An increase in the number of risk threshold exceptions

B.

An increase in the number of change events pending management review

C.

A decrease in the number of key performance indicators (KPIs)

D.

A decrease in the number of critical assets covered by risk thresholds

Full Access
Question # 113

A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?

A.

The contingency plan provides for backup media to be taken to the alternative site.

B.

The contingency plan for high priority applications does not involve a shared cold site.

C.

The alternative site is a hot site with equipment ready to resume processing immediately.

D.

The alternative site does not reside on the same fault no matter how far the distance apart.

Full Access
Question # 114

Which of the following BEST supports the management of identified risk scenarios?

A.

Collecting risk event data

B.

Maintaining a risk register

C.

Using key risk indicators (KRIs)

D.

Defining risk parameters

Full Access
Question # 115

Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?

A.

Internet of Things (IoT)

B.

Quantum computing

C.

Virtual reality (VR)

D.

Machine learning

Full Access
Question # 116

Which organizational role should be accountable for ensuring information assets are appropriately classified?

A.

Data protection officer

B.

Chief information officer (CIO)

C.

Information asset custodian

D.

Information asset owner

Full Access
Question # 117

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

A.

ensuring controls are operating efficiently and facilitating productivity.

B.

enabling senior leadership to better understand the level of risk the organization is facing.

C.

monitoring changes in the likelihood of adverse events due to ineffective controls.

D.

providing information on the degree to which controls are meeting intended objectives.

Full Access
Question # 118

Which of the following will MOST likely change as a result of the decrease in risk appetite due to a new privacy regulation?

A.

Key risk indicator (KRI) thresholds

B.

Risk trends

C.

Key performance indicators (KPIs)

D.

Risk objectives

Full Access
Question # 119

An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:

A.

senior management has oversight of the process.

B.

process ownership aligns with IT system ownership.

C.

segregation of duties exists between risk and process owners.

D.

risk owners have decision-making authority.

Full Access
Question # 120

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

A.

Assemble an incident response team.

B.

Create a disaster recovery plan (DRP).

C.

Develop a risk response plan.

D.

Initiate a business impact analysis (BIA).

Full Access
Question # 121

Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?

A.

Risk owner

B.

Risk practitioner

C.

Compliance manager

D.

Control owner

Full Access
Question # 122

Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?

A.

Risk register

B.

Risk scenario

C.

RACI matrix

D.

Risk response plan

Full Access
Question # 123

When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

A.

Reliance on qualitative analysis methods.

B.

Lack of a governance, risk, and compliance (GRC) tool.

C.

Lack of senior management involvement.

D.

Use of multiple risk registers.

Full Access
Question # 124

An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?

A.

Percentage of standard supplier uptime

B.

Average time to respond to incidents

C.

Number of assets included in recovery processes

D.

Number of key applications hosted

Full Access
Question # 125

A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?

A.

Encryption

B.

Authentication

C.

Configuration

D.

Backups

Full Access
Question # 126

Well-developed, data-driven risk measurements should be:

A.

reflective of the lowest organizational level.

B.

a data feed taken directly from operational production systems.

C.

reported to management the same day data is collected.

D.

focused on providing a forward-looking view.

Full Access
Question # 127

Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?

A.

Mean time between failures (MTBF)

B.

Mean time to recover (MTTR)

C.

Planned downtime

D.

Unplanned downtime

Full Access
Question # 128

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk appetite is decreased.

B.

Inherent risk is increased.

C.

Risk tolerance is decreased.

D.

Residual risk is increased.

Full Access
Question # 129

Which of the following is the MOST essential characteristic of a good IT risk scenario?

A.

The scenario is aligned to business control processes.

B.

The scenario is aligned to the organization’s risk appetite and tolerance.

C.

The scenario is aligned to a business objective.

D.

The scenario is aligned to known vulnerabilities in information technology.

Full Access
Question # 130

A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?

A.

Impact of the change on inherent risk

B.

Approval for the change by the risk owner

C.

Business rationale for the change

D.

Risk to the mitigation effort due to the change

Full Access
Question # 131

An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?

A.

Risk scenarios

B.

Risk ownership

C.

Risk impact

D.

Risk likelihood

Full Access
Question # 132

Which of the following scenarios is MOST important to communicate to senior management?

A.

Accepted risk scenarios with detailed plans for monitoring

B.

Risk scenarios that have been shared with vendors and third parties

C.

Accepted risk scenarios with impact exceeding the risk tolerance

D.

Risk scenarios that have been identified, assessed, and responded to by the risk owners

Full Access
Question # 133

A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?

A.

Risk ownership is not being assigned properly.

B.

The organization has a high level of risk appetite.

C.

Risk management procedures are outdated.

D.

The organization's risk awareness program is ineffective.

Full Access
Question # 134

Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?

A.

Segregation of duties

B.

Monetary approval limits

C.

Clear roles and responsibilities

D.

Password policies

Full Access
Question # 135

The risk to an organization's reputation due to a recent cybersecurity breach is PRIMARILY considered to be:

A.

financial risk.

B.

data risk.

C.

operational risk.

D.

strategic risk.

Full Access
Question # 136

External penetration tests MUST include:

A.

use of consultants to ensure completeness.

B.

communications to users of the target systems.

C.

changes to target data to prove the attack was successful.

D.

advance approval from system owners.

Full Access
Question # 137

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Assigning a data owner

B.

Scheduling periodic audits

C.

Implementing technical controls over the assets

D.

Implementing a data loss prevention (DLP) solution

Full Access
Question # 138

Which of the following is the BEST recommendation of a risk practitioner for an organization that recently changed its organizational structure?

A.

Communicate the new risk profile.

B.

Implement a new risk assessment process.

C.

Revalidate the corporate risk appetite.

D.

Review and adjust key risk indicators (KRIs).

Full Access
Question # 139

Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?

A.

It facilitates the use of a framework for risk management.

B.

It establishes a means for senior management to formally approve risk practices.

C.

It encourages risk-based decision making for stakeholders.

D.

It provides a basis for benchmarking against industry standards.

Full Access
Question # 140

Which of the following is the MOST critical consideration when awarding a project to a third-party service provider whose servers are located offshore?

A.

Difficulty of monitoring compliance due to geographical distance

B.

Cost implications due to installation of network intrusion detection systems (IDSs)

C.

Delays in incident communication

D.

Potential impact on data governance

Full Access
Question # 141

What is senior management's role in the RACI model when tasked with reviewing monthly status reports provided by risk owners?

A.

Accountable

B.

Informed

C.

Responsible

D.

Consulted

Full Access
Question # 142

When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?

A.

Results of benchmarking studies

B.

Results of risk assessments

C.

Number of emergency change requests

D.

Maturity model

Full Access
Question # 143

Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?

A.

Refer to industry standard scenarios.

B.

Use a top-down approach.

C.

Consider relevant business activities.

D.

Use a bottom-up approach.

Full Access
Question # 144

Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?

A.

To validate the quality of defined deliverables for the program

B.

To detect increases in program costs

C.

To ensure program risk events are mitigated in a timely manner

D.

To provide timely reporting to the governance steering committee

Full Access
Question # 145

Which strategy employed by risk management would BEST help to prevent internal fraud?

A.

Require control owners to conduct an annual control certification.

B.

Conduct regular internal and external audits on the systems supporting financial reporting.

C.

Ensure segregation of duties are implemented within key systems or processes.

D.

Require the information security officer to review unresolved incidents.

Full Access
Question # 146

Upon learning that the number of failed backup attempts continually exceeds

the current risk threshold, the risk practitioner should:

A.

initiate corrective action to address the known deficiency.

B.

adjust the risk threshold to better reflect actual performance.

C.

inquire about the status of any planned corrective actions.

D.

keep monitoring the situation as there is evidence that this is normal.

Full Access
Question # 147

Which of the following is the BEST response when a potential IT control deficiency has been identified?

A.

Remediate and report the deficiency to the enterprise risk committee.

B.

Verify the deficiency and then notify the business process owner.

C.

Verify the deficiency and then notify internal audit.

D.

Remediate and report the deficiency to senior executive management.

Full Access
Question # 148

Which of the following is the GREATEST risk associated with inappropriate classification of data?

A.

Inaccurate record management data

B.

Inaccurate recovery time objectives (RTOs)

C.

Lack of accountability for data ownership

D.

Users having unauthorized access to data

Full Access
Question # 149

Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?

A.

Risk management

B.

Business units

C.

External audit

D.

Internal audit

Full Access
Question # 150

After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

A.

A decrease in threats

B.

A change in the risk profile

C.

An increase in reported vulnerabilities

D.

An increase in identified risk scenarios

Full Access
Question # 151

Which of the following will BEST help to ensure implementation of corrective action plans?

A.

Contracting to third parties

B.

Establishing employee awareness training

C.

Setting target dates to complete actions

D.

Assigning accountability to risk owners

Full Access
Question # 152

Which of the following is the MOST important document regarding the treatment of sensitive data?

A.

Encryption policy

B.

Organization risk profile

C.

Digital rights management policy

D.

Information classification policy

Full Access
Question # 153

Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?

A.

A management-approved risk dashboard

B.

A current control framework

C.

A regularly updated risk register

D.

Regularly updated risk management procedures

Full Access
Question # 154

An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?

A.

Top-down analysis

B.

Event tree analysis

C.

Control gap analysis

D.

Bottom-up analysis

Full Access
Question # 155

Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?

A.

Conducting training on the protection of organizational assets

B.

Configuring devices to use virtual IP addresses

C.

Ensuring patching for end-user devices

D.

Providing encrypted access to organizational assets

Full Access
Question # 156

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

Full Access
Question # 157

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

Full Access
Question # 158

An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on theorganization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?

A.

Obfuscate the customers’ personal information.

B.

Require the business partner to delete personal information following the audit.

C.

Use a secure channel to transmit the files.

D.

Ensure the contract includes provisions for sharing personal information.

Full Access
Question # 159

A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?

A.

Mean time to restore (MTTR)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to detect (MTTD)

Full Access
Question # 160

Which of the following describes the relationship between risk appetite and risk tolerance?

A.

Risk appetite is completely independent of risk tolerance.

B.

Risk tolerance is used to determine risk appetite.

C.

Risk appetite and risk tolerance are synonymous.

D.

Risk tolerance may exceed risk appetite.

Full Access
Question # 161

Which of the following will BEST ensure that controls adequately support business goals and objectives?

A.

Using the risk management process

B.

Enforcing strict disciplinary procedures in case of noncompliance

C.

Reviewing results of the annual company external audit

D.

Adopting internationally accepted controls

Full Access
Question # 162

An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?

A.

Map the granular risk scenarios to the high-level risk register items.

B.

List application and server vulnerabilities in the IT risk register.

C.

Identify overlapping risk scenarios between the two registers.

D.

Maintain both high-level and granular risk scenarios in a single register.

Full Access
Question # 163

Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?

A.

Implement a tool to track the development team's deliverables.

B.

Review the software development life cycle.

C.

Involve the development team in planning.

D.

Assign more developers to the project team.

Full Access
Question # 164

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

A.

avoided.

B.

accepted.

C.

mitigated.

D.

transferred.

Full Access
Question # 165

Which of the following BEST enables detection of ethical violations committed by employees?

A.

Transaction log monitoring

B.

Access control attestation

C.

Periodic job rotation

D.

Whistleblower program

Full Access
Question # 166

Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?

A.

To identify gaps in data protection controls

B.

To develop a customer notification plan

C.

To identify personally identifiable information (Pll)

D.

To determine gaps in data identification processes

Full Access
Question # 167

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

A.

Performing a benchmark analysis and evaluating gaps

B.

Conducting risk assessments and implementing controls

C.

Communicating components of risk and their acceptable levels

D.

Participating in peer reviews and implementing best practices

Full Access
Question # 168

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

A.

Evaluate current risk management alignment with relevant regulations.

B.

Determine if business continuity procedures are reviewed and updated on a regular basis.

C.

Review the methodology used to conduct the business impact analysis (BIA).

D.

Conduct a benchmarking exercise against industry peers.

Full Access
Question # 169

When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:

A.

is correlated to risk and tracks variances in the risk.

B.

is assigned to IT processes and projects with a low level of risk.

C.

has a high correlation with the process outcome.

D.

triggers response based on risk thresholds.

Full Access
Question # 170

Risk mitigation is MOST effective when which of the following is optimized?

A.

Operational risk

B.

Residual risk

C.

Inherent risk

D.

Regulatory risk

Full Access
Question # 171

The PRIMARY focus of an ongoing risk awareness program should be to:

A.

enable better risk-based decisions.

B.

define appropriate controls to mitigate risk.

C.

determine impact of risk scenarios.

D.

expand understanding of risk indicators.

Full Access
Question # 172

Which of the following will BEST quantify the risk associated with malicious users in an organization?

A.

Business impact analysis

B.

Risk analysis

C.

Threat risk assessment

D.

Vulnerability assessment

Full Access
Question # 173

Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?

A.

Perform an m-depth code review with an expert

B.

Validate functionality by running in a test environment

C.

Implement a service level agreement.

D.

Utilize the change management process.

Full Access
Question # 174

A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?

A.

The underlying data source for the KRI is using inaccurate data and needs to be corrected.

B.

The KRI is not providing useful information and should be removed from the KRI inventory.

C.

The KRI threshold needs to be revised to better align with the organization s risk appetite

D.

Senior management does not understand the KRI and should undergo risk training.

Full Access
Question # 175

A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

A.

a root cause analysis is required

B.

controls are effective for ensuring continuity

C.

hardware needs to be upgraded

D.

no action is required as there was no impact

Full Access
Question # 176

When an organization's business continuity plan (BCP) states that it cannot afford to lose more than three hours of a critical application's data, the three hours is considered the application’s:

A.

Maximum tolerable outage (MTO).

B.

Recovery point objective (RPO).

C.

Mean time to restore (MTTR).

D.

Recovery time objective (RTO).

Full Access
Question # 177

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

A.

Service level agreement

B.

Customer service reviews

C.

Scope of services provided

D.

Right to audit the provider

Full Access
Question # 178

Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?

A.

Optimize the control environment.

B.

Realign risk appetite to the current risk level.

C.

Decrease the number of related risk scenarios.

D.

Reduce the risk management budget.

Full Access
Question # 179

After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk acceptance

D.

Risk transfer

Full Access
Question # 180

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

A.

To support regulatory requirements

B.

To prevent the risk scenario in the current environment

C.

To monitor for potential changes to the risk scenario

D.

To track historical risk assessment results

Full Access
Question # 181

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

A.

Continuous monitoring

B.

A control self-assessment

C.

Transaction logging

D.

Benchmarking against peers

Full Access
Question # 182

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

A.

Cost of offsite backup premises

B.

Cost of downtime due to a disaster

C.

Cost of testing the business continuity plan

D.

Response time of the emergency action plan

Full Access
Question # 183

A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?

A.

Risk impact

B.

Risk trend

C.

Risk appetite

D.

Risk likelihood

Full Access
Question # 184

A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?

A.

The organization's strategic risk management projects

B.

Senior management roles and responsibilities

C.

The organizations risk appetite and tolerance

D.

Senior management allocation of risk management resources

Full Access
Question # 185

An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?

A.

Perform a risk assessment

B.

Disable user access.

C.

Develop an access control policy.

D.

Perform root cause analysis.

Full Access
Question # 186

The acceptance of control costs that exceed risk exposure is MOST likely an example of:

A.

low risk tolerance.

B.

corporate culture misalignment.

C.

corporate culture alignment.

D.

high risk tolerance

Full Access
Question # 187

What is the BEST information to present to business control owners when justifying costs related to controls?

A.

Loss event frequency and magnitude

B.

The previous year's budget and actuals

C.

Industry benchmarks and standards

D.

Return on IT security-related investments

Full Access
Question # 188

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Full Access
Question # 189

Which of the following is MOST important to identify when developing generic risk scenarios?

A.

The organization’s vision and mission

B.

Resources required for risk mitigation

C.

Impact to business objectives

D.

Risk-related trends within the industry

Full Access
Question # 190

Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?

A.

A reduction in the number of help desk calls

B.

An increase in the number of identified system flaws

C.

A reduction in the number of user access resets

D.

An increase in the number of incidents reported

Full Access
Question # 191

Which of the following risk register updates is MOST important for senior management to review?

A.

Extending the date of a future action plan by two months

B.

Retiring a risk scenario no longer used

C.

Avoiding a risk that was previously accepted

D.

Changing a risk owner

Full Access
Question # 192

A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?

A.

invoke the established incident response plan.

B.

Inform internal audit.

C.

Perform a root cause analysis

D.

Conduct an immediate risk assessment

Full Access
Question # 193

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Full Access
Question # 194

A risk assessment has identified that an organization may not be in compliance with industry regulations. The BEST course of action would be to:

A.

conduct a gap analysis against compliance criteria.

B.

identify necessary controls to ensure compliance.

C.

modify internal assurance activities to include control validation.

D.

collaborate with management to meet compliance requirements.

Full Access
Question # 195

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

A.

Risk questionnaire

B.

Risk register

C.

Management assertion

D.

Compliance manual

Full Access
Question # 196

During testing, a risk practitioner finds the IT department's recovery time objective (RTO) for a key system does not align with the enterprise's business continuity plan (BCP). Which of the following should be done NEXT?

A.

Report the gap to senior management

B.

Consult with the IT department to update the RTO

C.

Complete a risk exception form.

D.

Consult with the business owner to update the BCP

Full Access
Question # 197

Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

A.

a gap analysis

B.

a root cause analysis.

C.

an impact assessment.

D.

a vulnerability assessment.

Full Access
Question # 198

During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:

A.

compensating controls are in place.

B.

a control mitigation plan is in place.

C.

risk management is effective.

D.

residual risk is accepted.

Full Access
Question # 199

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Full Access
Question # 200

Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?

A.

Ensuring availability of resources for log analysis

B.

Implementing log analysis tools to automate controls

C.

Ensuring the control is proportional to the risk

D.

Building correlations between logs collected from different sources

Full Access
Question # 201

Which of the following is the MOST effective key performance indicator (KPI) for change management?

A.

Percentage of changes with a fallback plan

B.

Number of changes implemented

C.

Percentage of successful changes

D.

Average time required to implement a change

Full Access
Question # 202

An organization wants to assess the maturity of its internal control environment. The FIRST step should be to:

A.

validate control process execution.

B.

determine if controls are effective.

C.

identify key process owners.

D.

conduct a baseline assessment.

Full Access
Question # 203

Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?

A.

Emphasizing risk in the risk profile that is related to critical business activities

B.

Customizing the presentation of the risk profile to the intended audience

C.

Including details of risk with high deviation from the risk appetite

D.

Providing information on the efficiency of controls for risk mitigation

Full Access
Question # 204

Which of the following is the BEST indication of an effective risk management program?

A.

Risk action plans are approved by senior management.

B.

Residual risk is within the organizational risk appetite

C.

Mitigating controls are designed and implemented.

D.

Risk is recorded and tracked in the risk register

Full Access
Question # 205

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

A.

Risk appetite statement

B.

Enterprise risk management framework

C.

Risk management policies

D.

Risk register

Full Access
Question # 206

Which of the following is MOST important when developing key performance indicators (KPIs)?

A.

Alignment to risk responses

B.

Alignment to management reports

C.

Alerts when risk thresholds are reached

D.

Identification of trends

Full Access
Question # 207

Which of the following would BEST help minimize the risk associated with social engineering threats?

A.

Enforcing employees’ sanctions

B.

Conducting phishing exercises

C.

Enforcing segregation of dunes

D.

Reviewing the organization's risk appetite

Full Access
Question # 208

Which of the following would BEST help an enterprise prioritize risk scenarios?

A.

Industry best practices

B.

Placement on the risk map

C.

Degree of variances in the risk

D.

Cost of risk mitigation

Full Access
Question # 209

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

A.

Key risk indicators (KRls)

B.

Inherent risk

C.

Residual risk

D.

Risk appetite

Full Access
Question # 210

Which of the following is the BEST way to identify changes to the risk landscape?

A.

Internal audit reports

B.

Access reviews

C.

Threat modeling

D.

Root cause analysis

Full Access
Question # 211

Which of the following is the MAIN reason to continuously monitor IT-related risk?

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Full Access
Question # 212

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Full Access
Question # 213

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Full Access
Question # 214

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

A.

Data controllers

B.

Data processors

C.

Data custodians

D.

Data owners

Full Access
Question # 215

A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?

A.

Business continuity director

B.

Disaster recovery manager

C.

Business application owner

D.

Data center manager

Full Access
Question # 216

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?

A.

Number of users that participated in the DRP testing

B.

Number of issues identified during DRP testing

C.

Percentage of applications that met the RTO during DRP testing

D.

Percentage of issues resolved as a result of DRP testing

Full Access
Question # 217

Which of the following is the BEST way to validate the results of a vulnerability assessment?

A.

Perform a penetration test.

B.

Review security logs.

C.

Conduct a threat analysis.

D.

Perform a root cause analysis.

Full Access
Question # 218

Which of the following is the MOST important benefit of key risk indicators (KRIs)'

A.

Assisting in continually optimizing risk governance

B.

Enabling the documentation and analysis of trends

C.

Ensuring compliance with regulatory requirements

D.

Providing an early warning to take proactive actions

Full Access
Question # 219

The MAIN purpose of conducting a control self-assessment (CSA) is to:

A.

gain a better understanding of the control effectiveness in the organization

B.

gain a better understanding of the risk in the organization

C.

adjust the controls prior to an external audit

D.

reduce the dependency on external audits

Full Access
Question # 220

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Full Access
Question # 221

An effective control environment is BEST indicated by controls that:

A.

minimize senior management's risk tolerance.

B.

manage risk within the organization's risk appetite.

C.

reduce the thresholds of key risk indicators (KRIs).

D.

are cost-effective to implement

Full Access
Question # 222

Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?

A.

A control self-assessment

B.

A third-party security assessment report

C.

Internal audit reports from the vendor

D.

Service level agreement monitoring

Full Access
Question # 223

Which of the following is the MOST important benefit of implementing a data classification program?

A.

Reduction in data complexity

B.

Reduction in processing times

C.

Identification of appropriate ownership

D.

Identification of appropriate controls

Full Access
Question # 224

The MOST effective way to increase the likelihood that risk responses will be implemented is to:

A.

create an action plan

B.

assign ownership

C.

review progress reports

D.

perform regular audits.

Full Access
Question # 225

Calculation of the recovery time objective (RTO) is necessary to determine the:

A.

time required to restore files.

B.

point of synchronization

C.

priority of restoration.

D.

annual loss expectancy (ALE).

Full Access
Question # 226

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

A.

Using an aggregated view of organizational risk

B.

Ensuring relevance to organizational goals

C.

Relying on key risk indicator (KRI) data Including

D.

Trend analysis of risk metrics

Full Access
Question # 227

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Full Access
Question # 228

Which of the following is the MOST important characteristic of an effective risk management program?

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Full Access
Question # 229

Which of the following will BEST mitigate the risk associated with IT and business misalignment?

A.

Establishing business key performance indicators (KPIs)

B.

Introducing an established framework for IT architecture

C.

Establishing key risk indicators (KRIs)

D.

Involving the business process owner in IT strategy

Full Access
Question # 230

Which of the following is MOST effective against external threats to an organizations confidential information?

A.

Single sign-on

B.

Data integrity checking

C.

Strong authentication

D.

Intrusion detection system

Full Access
Question # 231

Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?

A.

Number of tickets for provisioning new accounts

B.

Average time to provision user accounts

C.

Password reset volume per month

D.

Average account lockout time

Full Access
Question # 232

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

A.

reduces risk to an acceptable level

B.

quantifies risk impact

C.

aligns with business strategy

D.

advances business objectives.

Full Access
Question # 233

Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?

A.

Preventive

B.

Deterrent

C.

Compensating

D.

Detective

Full Access
Question # 234

Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?

A.

Obtaining logs m an easily readable format

B.

Providing accurate logs m a timely manner

C.

Collecting logs from the entire set of IT systems

D.

implementing an automated log analysis tool

Full Access
Question # 235

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

A.

Develop a compensating control.

B.

Allocate remediation resources.

C.

Perform a cost-benefit analysis.

D.

Identify risk responses

Full Access
Question # 236

Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?

A.

Percentage of systems included in recovery processes

B.

Number of key systems hosted

C.

Average response time to resolve system incidents

D.

Percentage of system availability

Full Access
Question # 237

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

A.

requirements of management.

B.

specific risk analysis framework being used.

C.

organizational risk tolerance

D.

results of the risk assessment.

Full Access
Question # 238

Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?

A.

Control chart

B.

Sensitivity analysis

C.

Trend analysis

D.

Decision tree

Full Access
Question # 239

Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?

A.

Changes in control design

B.

A decrease in the number of key controls

C.

Changes in control ownership

D.

An increase in residual risk

Full Access
Question # 240

A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?

A.

Document the finding in the risk register.

B.

Invoke the incident response plan.

C.

Re-evaluate key risk indicators.

D.

Modify the design of the control.

Full Access
Question # 241

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

A.

Perform annual risk assessments.

B.

Interview process owners.

C.

Review the risk register.

D.

Analyze key performance indicators (KPIs).

Full Access
Question # 242

Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?

A.

Maintain and review the classified data inventor.

B.

Implement mandatory encryption on data

C.

Conduct an awareness program for data owners and users.

D.

Define and implement a data classification policy

Full Access
Question # 243

What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?

A.

Use the severity rating to calculate risk.

B.

Classify the risk scenario as low-probability.

C.

Use the highest likelihood identified by risk management.

D.

Rely on range-based estimates provided by subject-matter experts.

Full Access
Question # 244

Which of the following would BEST provide early warning of a high-risk condition?

A.

Risk register

B.

Risk assessment

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

Full Access
Question # 245

Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?

A.

Encrypted storage of data

B.

Links to source data

C.

Audit trails for updates and deletions

D.

Check totals on data records and data fields

Full Access
Question # 246

In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?

A.

The control catalog

B.

The asset profile

C.

Business objectives

D.

Key risk indicators (KRls)

Full Access
Question # 247

Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?

A.

To build an organizational risk-aware culture

B.

To continuously improve risk management processes

C.

To comply with legal and regulatory requirements

D.

To identify gaps in risk management practices

Full Access
Question # 248

Which of the following is MOST helpful when determining whether a system security control is effective?

A.

Control standard operating procedures

B.

Latest security assessment

C.

Current security threat report

D.

Updated risk register

Full Access
Question # 249

Which of the following tools is MOST effective in identifying trends in the IT risk profile?

A.

Risk self-assessment

B.

Risk register

C.

Risk dashboard

D.

Risk map

Full Access
Question # 250

When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:

A.

Relevant policies.

B.

Threat landscape.

C.

Awareness program.

D.

Risk heat map.

Full Access
Question # 251

During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?

A.

Describe IT risk scenarios in terms of business risk.

B.

Recommend the formation of an executive risk council to oversee IT risk.

C.

Provide an estimate of IT system downtime if IT risk materializes.

D.

Educate business executives on IT risk concepts.

Full Access
Question # 252

After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:

A.

recommend a program that minimizes the concerns of that production system.

B.

inform the development team of the concerns, and together formulate risk reduction measures.

C.

inform the process owner of the concerns and propose measures to reduce them

D.

inform the IT manager of the concerns and propose measures to reduce them.

Full Access
Question # 253

It is MOST appropriate for changes to be promoted to production after they are:

A.

communicated to business management

B.

tested by business owners.

C.

approved by the business owner.

D.

initiated by business users.

Full Access
Question # 254

Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?

A.

Align business objectives to the risk profile.

B.

Assess risk against business objectives

C.

Implement an organization-specific risk taxonomy.

D.

Explain risk details to management.

Full Access
Question # 255

Which of the following provides the BEST evidence of the effectiveness of an organization's account provisioning process?

A.

User provisioning

B.

Role-based access controls

C.

Security log monitoring

D.

Entitlement reviews

Full Access
Question # 256

A risk practitioner is reviewing a vendor contract and finds there is no clause to control privileged access to the organization's systems by vendor employees. Which of the following is the risk practitioner's BEST course of action?

A.

Contact the control owner to determine if a gap in controls exists.

B.

Add this concern to the risk register and highlight it for management review.

C.

Report this concern to the contracts department for further action.

D.

Document this concern as a threat and conduct an impact analysis.

Full Access
Question # 257

Which of the following should be the HIGHEST priority when developing a risk response?

A.

The risk response addresses the risk with a holistic view.

B.

The risk response is based on a cost-benefit analysis.

C.

The risk response is accounted for in the budget.

D.

The risk response aligns with the organization's risk appetite.

Full Access
Question # 258

Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?

A.

A robust risk aggregation tool set

B.

Clearly defined roles and responsibilities

C.

A well-established risk management committee

D.

Well-documented and communicated escalation procedures

Full Access
Question # 259

The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:

A.

implement uniform controls for common risk scenarios.

B.

ensure business unit risk is uniformly distributed.

C.

build a risk profile for management review.

D.

quantify the organization's risk appetite.

Full Access
Question # 260

Which of the following is MOST commonly compared against the risk appetite?

A.

IT risk

B.

Inherent risk

C.

Financial risk

D.

Residual risk

Full Access
Question # 261

Which of the following should be the PRIMARY input when designing IT controls?

A.

Benchmark of industry standards

B.

Internal and external risk reports

C.

Recommendations from IT risk experts

D.

Outcome of control self-assessments

Full Access
Question # 262

Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?

A.

Community cloud

B.

Private cloud

C.

Hybrid cloud

D.

Public cloud

Full Access
Question # 263

When reviewing management's IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?

A.

Assess management's risk tolerance.

B.

Recommend management accept the low-risk scenarios.

C.

Propose mitigating controls

D.

Re-evaluate the risk scenarios associated with the control

Full Access
Question # 264

The PRIMARY objective for selecting risk response options is to:

A.

reduce risk 10 an acceptable level.

B.

identify compensating controls.

C.

minimize residual risk.

D.

reduce risk factors.

Full Access
Question # 265

Which of the following would be MOST helpful when estimating the likelihood of negative events?

A.

Business impact analysis

B.

Threat analysis

C.

Risk response analysis

D.

Cost-benefit analysis

Full Access
Question # 266

Which of the following would BEST help to ensure that suspicious network activity is identified?

A.

Analyzing intrusion detection system (IDS) logs

B.

Analyzing server logs

C.

Using a third-party monitoring provider

D.

Coordinating events with appropriate agencies

Full Access
Question # 267

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Developing contingency plans for key processes

B.

Implementing key performance indicators (KPIs)

C.

Adding risk triggers to entries in the risk register

D.

Establishing a series of key risk indicators (KRIs)

Full Access
Question # 268

The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

A.

align with audit results.

B.

benchmark with competitor s actions.

C.

reference best practice.

D.

focus on the business drivers

Full Access
Question # 269

Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

A.

possible risk and suggested mitigation plans.

B.

design of controls to encrypt the data to be shared.

C.

project plan for classification of the data.

D.

summary of data protection and privacy legislation.

Full Access
Question # 270

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner's BEST course of action?

A.

Collaborate with the risk owner to determine the risk response plan.

B.

Document the gap in the risk register and report to senior management.

C.

Include a right to audit clause in the service provider contract.

D.

Advise the risk owner to accept the risk.

Full Access
Question # 271

Which of the following should be the PRIMARY basis for prioritizing risk responses?

A.

The impact of the risk

B.

The replacement cost of the business asset

C.

The cost of risk mitigation controls

D.

The classification of the business asset

Full Access
Question # 272

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Assigning a data owner

B.

Implementing technical control over the assets

C.

Implementing a data loss prevention (DLP) solution

D.

Scheduling periodic audits

Full Access
Question # 273

Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?

A.

Data classification policy

B.

Emerging technology trends

C.

The IT strategic plan

D.

The risk register

Full Access
Question # 274

Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?

A.

Fiscal management practices

B.

Business maturity

C.

Budget for implementing security

D.

Management culture

Full Access
Question # 275

Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''

A.

Implement role-based access control

B.

Implement a data masking process

C.

Include sanctions in nondisclosure agreements (NDAs)

D.

Install a data loss prevention (DLP) tool

Full Access
Question # 276

The objective of aligning mitigating controls to risk appetite is to ensure that:

A.

exposures are reduced to the fullest extent

B.

exposures are reduced only for critical business systems

C.

insurance costs are minimized

D.

the cost of controls does not exceed the expected loss.

Full Access
Question # 277

Which of the following activities BEST facilitates effective risk management throughout the organization?

A.

Reviewing risk-related process documentation

B.

Conducting periodic risk assessments

C.

Performing a business impact analysis (BIA)

D.

Performing frequent audits

Full Access
Question # 278

Which of the following is MOST important to consider before determining a response to a vulnerability?

A.

The likelihood and impact of threat events

B.

The cost to implement the risk response

C.

Lack of data to measure threat events

D.

Monetary value of the asset

Full Access
Question # 279

Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?

A.

Conduct penetration testing.

B.

Interview IT operations personnel.

C.

Conduct vulnerability scans.

D.

Review change control board documentation.

Full Access
Question # 280

A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:

A.

risk score

B.

risk impact

C.

risk response

D.

risk likelihood.

Full Access
Question # 281

Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?

A.

Penetration testing

B.

IT general controls audit

C.

Vulnerability assessment

D.

Fault tree analysis

Full Access
Question # 282

A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?

A.

Define information retention requirements and policies

B.

Provide information security awareness training

C.

Establish security management processes and procedures

D.

Establish an inventory of information assets

Full Access
Question # 283

Which of the following is MOST important for successful incident response?

A.

The quantity of data logged by the attack control tools

B.

Blocking the attack route immediately

C.

The ability to trace the source of the attack

D.

The timeliness of attack recognition

Full Access
Question # 284

Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?

A.

Reviewing control objectives

B.

Aligning with industry best practices

C.

Consulting risk owners

D.

Evaluating KPIs in accordance with risk appetite

Full Access
Question # 285

During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?

A.

Escalate the non-cooperation to management

B.

Exclude applicable controls from the assessment.

C.

Review the supplier's contractual obligations.

D.

Request risk acceptance from the business process owner.

Full Access
Question # 286

When preparing a risk status report for periodic review by senior management, it is MOST important to ensure the report includes

A.

risk exposure in business terms

B.

a detailed view of individual risk exposures

C.

a summary of incidents that have impacted the organization.

D.

recommendations by an independent risk assessor.

Full Access
Question # 287

An organization's chief information officer (CIO) has proposed investing in a new. untested technology to take advantage of being first to market Senior management has concerns about the success of the project and has set a limit for expenditures before final approval. This conditional approval indicates the organization's risk:

A.

capacity.

B.

appetite.

C.

management capability.

D.

treatment strategy.

Full Access
Question # 288

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.

Control owner

B.

Risk owner

C.

Internal auditor

D.

Compliance manager

Full Access
Question # 289

Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?

A.

Several risk action plans have missed target completion dates.

B.

Senior management has accepted more risk than usual.

C.

Risk associated with many assets is only expressed in qualitative terms.

D.

Many risk scenarios are owned by the same senior manager.

Full Access
Question # 290

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

A.

Collecting data for IT risk assessment

B.

Establishing and communicating the IT risk profile

C.

Utilizing a balanced scorecard

D.

Performing and publishing an IT risk analysis

Full Access
Question # 291

Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application'?

A.

The third-party risk manager

B.

The application vendor

C.

The business process owner

D.

The information security manager

Full Access
Question # 292

Which of the following has the GREATEST influence on an organization's risk appetite?

A.

Threats and vulnerabilities

B.

Internal and external risk factors

C.

Business objectives and strategies

D.

Management culture and behavior

Full Access
Question # 293

Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?

A.

A centralized computer security response team

B.

Regular performance reviews and management check-ins

C.

Code of ethics training for all employees

D.

Communication of employee activity monitoring

Full Access
Question # 294

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 295

Which of the following is the MOST important step to ensure regulatory requirements are adequately addressed within an organization?

A.

Obtain necessary resources to address regulatory requirements

B.

Develop a policy framework that addresses regulatory requirements

C.

Perform a gap analysis against regulatory requirements.

D.

Employ IT solutions that meet regulatory requirements.

Full Access
Question # 296

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.

Prioritizing and addressing risk in line with risk appetite. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

Full Access
Question # 297

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

A.

Management approval

B.

Annual review

C.

Relevance

D.

Automation

Full Access
Question # 298

Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?

A.

Increase in mitigating control costs

B.

Increase in risk event impact

C.

Increase in risk event likelihood

D.

Increase in cybersecurity premium

Full Access
Question # 299

Reviewing which of the following BEST helps an organization gam insight into its overall risk profile''

A.

Risk register

B.

Risk appetite

C.

Threat landscape

D.

Risk metrics

Full Access
Question # 300

The MAIN purpose of selecting a risk response is to.

A.

ensure compliance with local regulatory requirements

B.

demonstrate the effectiveness of risk management practices.

C.

ensure organizational awareness of the risk level

D.

mitigate the residual risk to be within tolerance

Full Access
Question # 301

Who is the BEST person to the employee personal data?

A.

Human resources (HR) manager

B.

System administrator

C.

Data privacy manager

D.

Compliance manager

Full Access
Question # 302

Which of the following is MOST important for maintaining the effectiveness of an IT risk register?

A.

Removing entries from the register after the risk has been treated

B.

Recording and tracking the status of risk response plans within the register

C.

Communicating the register to key stakeholders

D.

Performing regular reviews and updates to the register

Full Access
Question # 303

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

A.

Change logs

B.

Change management meeting minutes

C.

Key control indicators (KCIs)

D.

Key risk indicators (KRIs)

Full Access
Question # 304

Who should be responsible (of evaluating the residual risk after a compensating control has been

A.

Compliance manager

B.

Risk owner

C.

Control owner

D.

Risk practitioner

Full Access
Question # 305

Which of the following contributes MOST to the effective implementation of risk responses?

A.

Clear understanding of the risk

B.

Comparable industry risk trends

C.

Appropriate resources

D.

Detailed standards and procedures

Full Access
Question # 306

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

A.

Transborder data transfer restrictions

B.

Differences in regional standards

C.

Lack of monitoring over vendor activities

D.

Lack of after-hours incident management support

Full Access
Question # 307

Which of the following provides the MOST comprehensive information when developing a risk profile for a system?

A.

Results of a business impact analysis (BIA)

B.

Risk assessment results

C.

A mapping of resources to business processes

D.

Key performance indicators (KPIs)

Full Access
Question # 308

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

A.

The difference In the management practices between each company

B.

The cloud computing environment is shared with another company

C.

The lack of a service level agreement (SLA) in the vendor contract

D.

The organizational culture differences between each country

Full Access
Question # 309

Which of the following is the PRIMARY objective of maintaining an information asset inventory?

A.

To provide input to business impact analyses (BIAs)

B.

To protect information assets

C.

To facilitate risk assessments

D.

To manage information asset licensing

Full Access
Question # 310

Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?

A.

Reject the risk acceptance and require mitigating controls.

B.

Monitor the residual risk level of the accepted risk.

C.

Escalate the risk decision to the project sponsor for review.

D.

Document the risk decision in the project risk register.

Full Access
Question # 311

Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?

A.

Average bandwidth usage

B.

Peak bandwidth usage

C.

Total bandwidth usage

D.

Bandwidth used during business hours

Full Access
Question # 312

After the implementation of internal of Things (IoT) devices, new risk scenarios were identified. What is the PRIMARY reason to report this information to risk owners?

A.

To reevaluate continued use to IoT devices

B.

The add new controls to mitigate the risk

C.

The recommend changes to the IoT policy

D.

To confirm the impact to the risk profile

Full Access
Question # 313

Which risk response strategy could management apply to both positive and negative risk that has been identified?

A.

Transfer

B.

Accept

C.

Exploit

D.

Mitigate

Full Access
Question # 314

Which of the following would provide the BEST evidence of an effective internal control environment/?

A.

Risk assessment results

B.

Adherence to governing policies

C.

Regular stakeholder briefings

D.

Independent audit results

Full Access
Question # 315

Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?

A.

Recovery time objectives (RTOs)

B.

Segregation of duties

C.

Communication plan

D.

Critical asset inventory

Full Access
Question # 316

Which of the following will BEST help to ensure implementation of corrective action plans?

A.

Establishing employee awareness training

B.

Assigning accountability to risk owners

C.

Selling target dates to complete actions

D.

Contracting to third parties

Full Access
Question # 317

To define the risk management strategy which of the following MUST be set by the board of directors?

A.

Operational strategies

B.

Risk governance

C.

Annualized loss expectancy (ALE)

D.

Risk appetite

Full Access
Question # 318

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Full Access
Question # 319

What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?

A.

Reduce internal threats

B.

Reduce exposure to vulnerabilities

C.

Eliminate risk associated with personnel

D.

Ensure new hires have the required skills

Full Access
Question # 320

When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:

A.

Assess generic risk scenarios with business users.

B.

Validate the generic risk scenarios for relevance.

C.

Select the maximum possible risk scenarios from the list.

D.

Identify common threats causing generic risk scenarios

Full Access
Question # 321

A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?

A.

IT security managers

B.

IT control owners

C.

IT auditors

D.

IT risk owners

Full Access
Question # 322

An IT risk threat analysis is BEST used to establish

A.

risk scenarios

B.

risk maps

C.

risk appetite

D.

risk ownership.

Full Access
Question # 323

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?

A.

Collaborate with the risk owner to determine the risk response plan.

B.

Document the gap in the risk register and report to senior management.

C.

Include a right to audit clause in the service provider contract.

D.

Advise the risk owner to accept the risk.

Full Access
Question # 324

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?

A.

Develop new loT risk scenarios.

B.

Implement loT device monitoring software.

C.

Introduce controls to the new threat environment.

D.

Engage external security reviews.

Full Access
Question # 325

Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?

A.

Temporarily mitigate the OS vulnerabilities

B.

Document and implement a patching process

C.

Evaluate permanent fixes such as patches and upgrades

D.

Identify the vulnerabilities and applicable OS patches

Full Access
Question # 326

Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?

A.

Business case documentation

B.

Organizational risk appetite statement

C.

Enterprise architecture (EA) documentation

D.

Organizational hierarchy

Full Access
Question # 327

Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?

A.

Manual vulnerability scanning processes

B.

Organizational reliance on third-party service providers

C.

Inaccurate documentation of enterprise architecture (EA)

D.

Risk-averse organizational risk appetite

Full Access
Question # 328

It is MOST important that security controls for a new system be documented in:

A.

testing requirements

B.

the implementation plan.

C.

System requirements

D.

The security policy

Full Access
Question # 329

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?

A.

Forensic analysis

B.

Risk assessment

C.

Root cause analysis

D.

Business impact analysis (BlA)

Full Access
Question # 330

A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?

A.

Request a regulatory risk reporting methodology

B.

Require critical success factors (CSFs) for IT risks.

C.

Establish IT-specific compliance objectives

D.

Communicate IT key risk indicators (KRIs) and triggers

Full Access
Question # 331

Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?

A.

Individuals outside IT are managing action plans for the risk scenarios.

B.

Target dates for completion are missing from some action plans.

C.

Senior management approved multiple changes to several action plans.

D.

Many action plans were discontinued after senior management accepted the risk.

Full Access
Question # 332

Which of the following is the GREATEST benefit of a three lines of defense structure?

A.

An effective risk culture that empowers employees to report risk

B.

Effective segregation of duties to prevent internal fraud

C.

Clear accountability for risk management processes

D.

Improved effectiveness and efficiency of business operations

Full Access
Question # 333

Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....

A.

The organization's structure has not been updated

B.

Unnecessary access permissions have not been removed.

C.

Company equipment has not been retained by IT

D.

Job knowledge was not transferred to employees m the former department

Full Access
Question # 334

it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?

A.

The underutilization of the replicated Iink

B.

The cost of recovering the data

C.

The lack of integrity of data

D.

The loss of data confidentiality

Full Access
Question # 335

Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?

A.

Ensuring processes are documented to enable effective control execution

B.

Ensuring regular risk messaging is Included in business communications from leadership

C.

Ensuring schedules and deadlines for control-related deliverables are strictly monitored

D.

Ensuring performance metrics balance business goals with risk appetite

Full Access
Question # 336

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

A.

Information security officer

B.

IT risk manager

C.

Business owner

D.

Chief risk officer (CRO)

Full Access
Question # 337

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 338

Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?

A.

Business impact analysis (BIA) results

B.

Risk scenario ownership

C.

Risk thresholds

D.

Possible causes of materialized risk

Full Access
Question # 339

Before assigning sensitivity levels to information it is MOST important to:

A.

define recovery time objectives (RTOs).

B.

define the information classification policy

C.

conduct a sensitivity analyse

D.

Identify information custodians

Full Access
Question # 340

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

A.

data logging and monitoring

B.

data mining and analytics

C.

data classification and labeling

D.

data retention and destruction

Full Access
Question # 341

The PRIMARY purpose of vulnerability assessments is to:

A.

provide clear evidence that the system is sufficiently secure.

B.

determine the impact of potential threats.

C.

test intrusion detection systems (IDS) and response procedures.

D.

detect weaknesses that could lead to system compromise.

Full Access
Question # 342

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

A.

Code review

B.

Penetration test

C.

Gap assessment

D.

Business impact analysis (BIA)

Full Access
Question # 343

Which of the following is MOST helpful in providing an overview of an organization's risk management program?

A.

Risk management treatment plan

B.

Risk assessment results

C.

Risk management framework

D.

Risk register

Full Access
Question # 344

Which of the following is MOST important to update when an organization's risk appetite changes?

A.

Key risk indicators (KRIs)

B.

Risk reporting methodology

C.

Key performance indicators (KPIs)

D.

Risk taxonomy

Full Access
Question # 345

During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?

A.

Risk management framework adopted by each company

B.

Risk registers of both companies

C.

IT balanced scorecard of each company

D.

Most recent internal audit findings from both companies

Full Access
Question # 346

An organization maintains independent departmental risk registers that are not automatically aggregated. Which of the following is the GREATEST concern?

A.

Management may be unable to accurately evaluate the risk profile.

B.

Resources may be inefficiently allocated.

C.

The same risk factor may be identified in multiple areas.

D.

Multiple risk treatment efforts may be initiated to treat a given risk.

Full Access
Question # 347

An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?

A.

Data minimization

B.

Accountability

C.

Accuracy

D.

Purpose limitation

Full Access
Question # 348

An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

A.

Recommend risk remediation

B.

Change the level of risk appetite

C.

Document formal acceptance of the risk

D.

Reject the business initiative

Full Access
Question # 349

Which of the blowing is MOST important when implementing an organization s security policy?

A.

Obtaining management support

B.

Benchmarking against industry standards

C.

Assessing compliance requirements

D.

Identifying threats and vulnerabilities

Full Access
Question # 350

Which of the following is the MAIN purpose of monitoring risk?

A.

Communication

B.

Risk analysis

C.

Decision support

D.

Benchmarking

Full Access
Question # 351

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

A.

Enroll the employee in additional security training.

B.

Invoke the incident response plan.

C.

Conduct an internal audit.

D.

Instruct the vendor to delete the data.

Full Access
Question # 352

Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?

A.

Monitor risk controls.

B.

Implement preventive measures.

C.

Implement detective controls.

D.

Transfer the risk.

Full Access
Question # 353

The MAIN reason for prioritizing IT risk responses is to enable an organization to:

A.

determine the risk appetite.

B.

determine the budget.

C.

define key performance indicators (KPIs).

D.

optimize resource utilization.

Full Access
Question # 354

Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?

A.

Some critical business applications are not included in the plan

B.

Several recovery activities will be outsourced

C.

The plan is not based on an internationally recognized framework

D.

The chief information security officer (CISO) has not approved the plan

Full Access
Question # 355

Which of the following is the MOST important outcome of a business impact analysis (BIA)?

A.

Understanding and prioritization of critical processes

B.

Completion of the business continuity plan (BCP)

C.

Identification of regulatory consequences

D.

Reduction of security and business continuity threats

Full Access
Question # 356

Which of the following BEST helps to identify significant events that could impact an organization?

A.

Control analysis

B.

Vulnerability analysis

C.

Scenario analysis

D.

Heat map analysis

Full Access
Question # 357

Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''

A.

A summary of risk response plans with validation results

B.

A report with control environment assessment results

C.

A dashboard summarizing key risk indicators (KRIs)

D.

A summary of IT risk scenarios with business cases

Full Access
Question # 358

An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?

A.

Limited organizational knowledge of the underlying technology

B.

Lack of commercial software support

C.

Varying costs related to implementation and maintenance

D.

Slow adoption of the technology across the financial industry

Full Access
Question # 359

Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?

A.

To align with board reporting requirements

B.

To assist management in decision making

C.

To create organization-wide risk awareness

D.

To minimize risk mitigation efforts

Full Access
Question # 360

In order to determining a risk is under-controlled the risk practitioner will need to

A.

understand the risk tolerance

B.

monitor and evaluate IT performance

C.

identify risk management best practices

D.

determine the sufficiency of the IT risk budget

Full Access
Question # 361

As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?

A.

An assessment of threats to the organization

B.

An assessment of recovery scenarios

C.

industry standard framework

D.

Documentation of testing procedures

Full Access
Question # 362

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

A.

involve IT leadership in the policy development process

B.

Require business users to sign acknowledgment of the poises

C.

involve business owners in the pokey development process

D.

Provide policy owners with greater enforcement authority

Full Access
Question # 363

What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?

A.

Segment the system on its own network.

B.

Ensure regular backups take place.

C.

Virtualize the system in the cloud.

D.

Install antivirus software on the system.

Full Access
Question # 364

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

A.

Vulnerability scanning

B.

Systems log correlation analysis

C.

Penetration testing

D.

Monitoring of intrusion detection system (IDS) alerts

Full Access
Question # 365

During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:

A.

reset the alert threshold based on peak traffic

B.

analyze the traffic to minimize the false negatives

C.

analyze the alerts to minimize the false positives

D.

sniff the traffic using a network analyzer

Full Access
Question # 366

Which of the following is MOST useful when communicating risk to management?

A.

Risk policy

B.

Audit report

C.

Risk map

D.

Maturity model

Full Access
Question # 367

Which of the following would be MOST helpful when communicating roles associated with the IT risk management process?

A.

Skills matrix

B.

Job descriptions

C.

RACI chart

D.

Organizational chart

Full Access
Question # 368

The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:

A.

inconsistencies between security policies and procedures

B.

possible noncompliant activities that lead to data disclosure

C.

leading or lagging key risk indicators (KRIs)

D.

unknown threats to undermine existing access controls

Full Access
Question # 369

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

A.

Organizational reporting process

B.

Incident reporting procedures

C.

Regularly scheduled audits

D.

Incident management policy

Full Access
Question # 370

Which of the following is the MOST critical element to maximize the potential for a successful security implementation?

A.

The organization's knowledge

B.

Ease of implementation

C.

The organization's culture

D.

industry-leading security tools

Full Access
Question # 371

Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?

A.

Risk appetite

B.

Control cost

C.

Control effectiveness

D.

Risk tolerance

Full Access
Question # 372

Which of the following will BEST help in communicating strategic risk priorities?

A.

Heat map

B.

Business impact analysis (BIA)

C.

Balanced Scorecard

D.

Risk register

Full Access
Question # 373

When updating the risk register after a risk assessment, which of the following is MOST important to include?

A.

Historical losses due to past risk events

B.

Cost to reduce the impact and likelihood

C.

Likelihood and impact of the risk scenario

D.

Actor and threat type of the risk scenario

Full Access
Question # 374

A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?

A.

Align applications to business processes.

B.

Implement an enterprise architecture (EA).

C.

Define the software development life cycle (SDLC).

D.

Define enterprise-wide system procurement requirements.

Full Access
Question # 375

Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?

A.

Cause-and-effect diagram

B.

Delphi technique

C.

Bottom-up approach

D.

Top-down approach

Full Access
Question # 376

For a large software development project, risk assessments are MOST effective when performed:

A.

before system development begins.

B.

at system development.

C.

at each stage of the system development life cycle (SDLC).

D.

during the development of the business case.

Full Access
Question # 377

The MAIN reason for creating and maintaining a risk register is to:

A.

assess effectiveness of different projects.

B.

define the risk assessment methodology.

C.

ensure assets have low residual risk.

D.

account for identified key risk factors.

Full Access
Question # 378

A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?

A.

Identify changes in risk factors and initiate risk reviews.

B.

Engage an external consultant to redesign the risk management process.

C.

Outsource the process for updating the risk register.

D.

Implement a process improvement and replace the old risk register.

Full Access
Question # 379

When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:

A.

cost-benefit analysis.

B.

risk appetite.

C.

regulatory guidelines

D.

control efficiency

Full Access
Question # 380

When of the following provides the MOST tenable evidence that a business process control is effective?

A.

Demonstration that the control is operating as designed

B.

A successful walk-through of the associated risk assessment

C.

Management attestation that the control is operating effectively

D.

Automated data indicating that risk has been reduced

Full Access
Question # 381

Which of the following is the MOST common concern associated with outsourcing to a service provider?

A.

Lack of technical expertise

B.

Combining incompatible duties

C.

Unauthorized data usage

D.

Denial of service attacks

Full Access
Question # 382

Which of the following is the BEST indication of a mature organizational risk culture?

A.

Corporate risk appetite is communicated to staff members.

B.

Risk owners understand and accept accountability for risk.

C.

Risk policy has been published and acknowledged by employees.

D.

Management encourages the reporting of policy breaches.

Full Access
Question # 383

Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?

A.

Key audit findings

B.

Treatment plan status

C.

Performance indicators

D.

Risk scenario results

Full Access
Question # 384

Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?

A.

Obtain objective assessment of the control environment.

B.

Ensure the risk profile is defined and communicated.

C.

Validate the threat management process.

D.

Obtain an objective view of process gaps and systemic errors.

Full Access
Question # 385

Which of the following should be done FIRST when information is no longer required to support business objectives?

A.

Archive the information to a backup database.

B.

Protect the information according to the classification policy.

C.

Assess the information against the retention policy.

D.

Securely and permanently erase the information

Full Access
Question # 386

An organization's IT infrastructure is running end-of-life software that is not allowed without exception approval. Which of the following would provide the MOST helpful information to justify investing in updated software?

A.

The balanced scorecard

B.

A cost-benefit analysis

C.

The risk management frameworkD, A roadmap of IT strategic planning

Full Access
Question # 387

What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?

A.

Potential loss to tie business due to non-performance of the asset

B.

Known emerging environmental threats

C.

Known vulnerabilities published by the asset developer

D.

Cost of replacing the asset with a new asset providing similar services

Full Access
Question # 388

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

A.

Validating employee social media accounts and passwords

B.

Monitoring Internet usage on employee workstations

C.

Disabling social media access from the organization's technology

D.

Implementing training and awareness programs

Full Access
Question # 389

Determining if organizational risk is tolerable requires:

A.

mapping residual risk with cost of controls

B.

comparing against regulatory requirements

C.

comparing industry risk appetite with the organizations.

D.

understanding the organization's risk appetite.

Full Access
Question # 390

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?

A.

Percentage of job failures identified and resolved during the recovery process

B.

Percentage of processes recovered within the recovery time and point objectives

C.

Number of current test plans and procedures

D.

Number of issues and action items resolved during the recovery test

Full Access
Question # 391

Which of the following poses the GREATEST risk to an organization's operations during a major it transformation?

A.

Lack of robust awareness programs

B.

infrequent risk assessments of key controls

C.

Rapid changes in IT procedures

D.

Unavailability of critical IT systems

Full Access
Question # 392

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

A.

Balanced scorecard

B.

Capability maturity level

C.

Internal audit plan

D.

Control self-assessment (CSA)

Full Access
Question # 393

Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner's BEST recommendation to address this situation?

A.

Conduct a comprehensive compliance review.

B.

Develop incident response procedures for noncompliance.

C.

Investigate the root cause of noncompliance.

D.

Declare a security breach and Inform management.

Full Access
Question # 394

Which of the following methods is an example of risk mitigation?

A.

Not providing capability for employees to work remotely

B.

Outsourcing the IT activities and infrastructure

C.

Enforcing change and configuration management processes

D.

Taking out insurance coverage for IT-related incidents

Full Access
Question # 395

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

A.

A record of incidents is maintained.

B.

Forensic investigations are facilitated.

C.

Security violations can be identified.

D.

Developing threats are detected earlier.

Full Access
Question # 396

A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?

A.

Single sign-on

B.

Audit trail review

C.

Multi-factor authentication

D.

Data encryption at rest

Full Access
Question # 397

A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:

A.

updating the risk register

B.

documenting the risk scenarios.

C.

validating the risk scenarios

D.

identifying risk mitigation controls.

Full Access
Question # 398

What is the PRIMARY benefit of risk monitoring?

A.

It reduces the number of audit findings.

B.

It provides statistical evidence of control efficiency.

C.

It facilitates risk-aware decision making.

D.

It facilitates communication of threat levels.

Full Access
Question # 399

An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?

A.

Risk owner

B.

IT security manager

C.

IT system owner

D.

Control owner

Full Access
Question # 400

Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?

A.

Apply available security patches.

B.

Schedule a penetration test.

C.

Conduct a business impact analysis (BIA)

D.

Perform a vulnerability analysis.

Full Access
Question # 401

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

A.

detected incidents.

B.

residual risk.

C.

vulnerabilities.

D.

inherent risk.

Full Access
Question # 402

Which of the following BEST enables the identification of trends in risk levels?

A.

Correlation between risk levels and key risk indicators (KRIs) is positive.

B.

Measurements for key risk indicators (KRIs) are repeatable

C.

Quantitative measurements are used for key risk indicators (KRIs).

D.

Qualitative definitions for key risk indicators (KRIs) are used.

Full Access
Question # 403

Vulnerabilities have been detected on an organization's systems. Applications installed on these systems will not operate if the underlying servers are updated. Which of the following is the risk practitioner's BEST course of action?

A.

Recommend the business change the application.

B.

Recommend a risk treatment plan.

C.

Include the risk in the next quarterly update to management.

D.

Implement compensating controls.

Full Access
Question # 404

What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?

A.

Risk impact

B.

Risk likelihood

C.

Risk appropriate

D.

Control self-assessments (CSAs)

Full Access
Question # 405

Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?

A.

Establish baseline security configurations with the cloud service provider.

B.

Require the cloud prowler 10 disclose past data privacy breaches.

C.

Ensure the cloud service provider performs an annual risk assessment.

D.

Specify cloud service provider liability for data privacy breaches in the contract

Full Access
Question # 406

Which of the following should be included in a risk scenario to be used for risk analysis?

A.

Risk appetite

B.

Threat type

C.

Risk tolerance

D.

Residual risk

Full Access
Question # 407

When of the following 15 MOST important when developing a business case for a proposed security investment?

A.

identification of control requirements

B.

Alignment to business objectives

C.

Consideration of new business strategies

D.

inclusion of strategy for regulatory compliance

Full Access
Question # 408

An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?

A.

Identify systems that are vulnerable to being exploited by the attack.

B.

Confirm with the antivirus solution vendor whether the next update will detect the attack.

C.

Verify the data backup process and confirm which backups are the most recent ones available.

D.

Obtain approval for funding to purchase a cyber insurance plan.

Full Access
Question # 409

Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?

A.

Perform a post-implementation review.

B.

Conduct user acceptance testing.

C.

Review the key performance indicators (KPIs).

D.

Interview process owners.

Full Access
Question # 410

Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?

A.

Percentage of unpatched IT assets

B.

Percentage of IT assets without ownership

C.

The number of IT assets securely disposed during the past year

D.

The number of IT assets procured during the previous month

Full Access
Question # 411

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

A.

Conduct social engineering testing.

B.

Audit security awareness training materials.

C.

Administer an end-of-training quiz.

D.

Perform a vulnerability assessment.

Full Access
Question # 412

Which of the following provides the BEST measurement of an organization's risk management maturity level?

A.

Level of residual risk

B.

The results of a gap analysis

C.

IT alignment to business objectives

D.

Key risk indicators (KRIs)

Full Access
Question # 413

In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?

A.

Implementation

B.

Development

C.

Design

D.

Feasibility

Full Access
Question # 414

Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?

A.

Key performance indicators (KPIs)

B.

Risk heat maps

C.

Internal audit findings

D.

Periodic penetration testing

Full Access
Question # 415

Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?

A.

IT management

B.

Internal audit

C.

Process owners

D.

Senior management

Full Access
Question # 416

Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?

A.

Manage cyber risk according to the organization's risk management framework.

B.

Define cyber roles and responsibilities across the organization

C.

Conduct cyber risk awareness training tailored specifically for senior management

D.

Implement a cyber risk program based on industry best practices

Full Access
Question # 417

An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?

A.

More time has been allotted for testing.

B.

The project is likely to deliver the product late.

C.

A new project manager is handling the project.

D.

The cost of the project will exceed the allotted budget.

Full Access
Question # 418

Days before the realization of an acquisition, a data breach is discovered at the company to be acquired. For the accruing organization, this situation represents which of the following?

A.

Threat event

B.

Inherent risk

C.

Risk event

D.

Security incident

Full Access
Question # 419

The BEST way to improve a risk register is to ensure the register:

A.

is updated based upon significant events.

B.

documents possible countermeasures.

C.

contains the risk assessment completion date.

D.

is regularly audited.

Full Access
Question # 420

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

A.

Sustained financial loss

B.

Cost of remediation efforts

C.

Duration of service outage

D.

Average time to recovery

Full Access
Question # 421

Which of the following approaches will BEST help to ensure the effectiveness of risk awareness training?

A.

Piloting courses with focus groups

B.

Using reputable third-party training programs

C.

Reviewing content with senior management

D.

Creating modules for targeted audiences

Full Access
Question # 422

A risk practitioner is preparing a report to communicate changes in the risk and control environment. The BEST way to engage stakeholder attention is to:

A.

include detailed deviations from industry benchmarks,

B.

include a summary linking information to stakeholder needs,

C.

include a roadmap to achieve operational excellence,

D.

publish the report on-demand for stakeholders.

Full Access
Question # 423

Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?

A.

Customer database manager

B.

Customer data custodian

C.

Data privacy officer

D.

Audit committee

Full Access
Question # 424

Which of the following would BEST indicate to senior management that IT processes are improving?

A.

Changes in the number of intrusions detected

B.

Changes in the number of security exceptions

C.

Changes in the position in the maturity model

D.

Changes to the structure of the risk register

Full Access
Question # 425

A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?

A.

Identify new risk entries to include in ERM.

B.

Remove the risk entries from the ERM register.

C.

Re-perform the risk assessment to confirm results.

D.

Verify the adequacy of risk monitoring plans.

Full Access
Question # 426

The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:

A.

availability of fault tolerant software.

B.

strategic plan for business growth.

C.

vulnerability scan results of critical systems.

D.

redundancy of technical infrastructure.

Full Access
Question # 427

Which of the following is MOST important to the successful development of IT risk scenarios?

A.

Cost-benefit analysis

B.

Internal and external audit reports

C.

Threat and vulnerability analysis

D.

Control effectiveness assessment

Full Access
Question # 428

An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:

A.

identify key risk indicators (KRls) for ongoing monitoring

B.

validate the CTO's decision with the business process owner

C.

update the risk register with the selected risk response

D.

recommend that the CTO revisit the risk acceptance decision.

Full Access
Question # 429

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?

A.

Monitor the databases for abnormal activity

B.

Approve exception to allow the software to continue operating

C.

Require the software vendor to remediate the vulnerabilities

D.

Accept the risk and let the vendor run the software as is

Full Access
Question # 430

Which of the following BEST indicates the efficiency of a process for granting access privileges?

A.

Average time to grant access privileges

B.

Number of changes in access granted to users

C.

Average number of access privilege exceptions

D.

Number and type of locked obsolete accounts

Full Access
Question # 431

The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:

A.

changes due to emergencies.

B.

changes that cause incidents.

C.

changes not requiring user acceptance testing.

D.

personnel that have rights to make changes in production.

Full Access
Question # 432

An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?

A.

Require the vendor to degauss the hard drives

B.

Implement an encryption policy for the hard drives.

C.

Require confirmation of destruction from the IT manager.

D.

Use an accredited vendor to dispose of the hard drives.

Full Access
Question # 433

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.

B.

Implement a key performance indicator (KPI) to monitor the existing control performance.

C.

Accept the residual risk in its entirety and obtain executive management approval.

D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.

Full Access
Question # 434

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

A.

The value at which control effectiveness would fail

B.

Thresholds benchmarked to peer organizations

C.

A typical operational value

D.

A value that represents the intended control state

Full Access
Question # 435

Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?

A.

Encrypt the data while in transit lo the supplier

B.

Contractually obligate the supplier to follow privacy laws.

C.

Require independent audits of the supplier's control environment

D.

Utilize blockchain during the data transfer

Full Access
Question # 436

Which of the following BEST indicates the effectiveness of anti-malware software?

A.

Number of staff hours lost due to malware attacks

B.

Number of downtime hours in business critical servers

C.

Number of patches made to anti-malware software

D.

Number of successful attacks by malicious software

Full Access
Question # 437

Which of the following is the BEST evidence that risk management is driving business decisions in an organization?

A.

Compliance breaches are addressed in a timely manner.

B.

Risk ownership is identified and assigned.

C.

Risk treatment options receive adequate funding.

D.

Residual risk is within risk tolerance.

Full Access
Question # 438

Which of the following should be the PRIMARY focus of an IT risk awareness program?

A.

Ensure compliance with the organization's internal policies

B.

Cultivate long-term behavioral change.

C.

Communicate IT risk policy to the participants.

D.

Demonstrate regulatory compliance.

Full Access
Question # 439

To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?

A.

Enforce segregation of duties.

B.

Disclose potential conflicts of interest.

C.

Delegate responsibilities involving the acquaintance.

D.

Notify the subsidiary's legal team.

Full Access
Question # 440

After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:

Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?

A.

External audit

B.

Internal audit

C.

Vendor performance scorecard

D.

Regulatory examination

Full Access
Question # 441

Which of the following is MOST important to include in a risk assessment of an emerging technology?

A.

Risk response plans

B.

Risk and control ownership

C.

Key controls

D.

Impact and likelihood ratings

Full Access
Question # 442

A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?

A.

Sensitivity of the data

B.

Readability of test data

C.

Security of the test environment

D.

Availability of data to authorized staff

Full Access
Question # 443

Which of the following is MOST important when developing key risk indicators (KRIs)?

A.

Alignment with regulatory requirements

B.

Availability of qualitative data

C.

Properly set thresholds

D.

Alignment with industry benchmarks

Full Access
Question # 444

Which of the following is the MOST effective way to integrate risk and compliance management?

A.

Embedding risk management into compliance decision-making

B.

Designing corrective actions to improve risk response capabilities

C.

Embedding risk management into processes that are aligned with business drivers

D.

Conducting regular self-assessments to verify compliance

Full Access
Question # 445

Which of the following should be an element of the risk appetite of an organization?

A.

The effectiveness of compensating controls

B.

The enterprise's capacity to absorb loss

C.

The residual risk affected by preventive controls

D.

The amount of inherent risk considered appropriate

Full Access
Question # 446

Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?

A.

It provides a cost-benefit analysis on control options available for implementation.

B.

It provides a view on where controls should be applied to maximize the uptime of servers.

C.

It provides historical information about the impact of individual servers malfunctioning.

D.

It provides a comprehensive view of the impact should the servers simultaneously fail.

Full Access
Question # 447

Which of the following scenarios represents a threat?

A.

Connecting a laptop to a free, open, wireless access point (hotspot)

B.

Visitors not signing in as per policy

C.

Storing corporate data in unencrypted form on a laptop

D.

A virus transmitted on a USB thumb drive

Full Access
Question # 448

Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:

A.

a threat.

B.

a vulnerability.

C.

an impact

D.

a control.

Full Access
Question # 449

Risk acceptance of an exception to a security control would MOST likely be justified when:

A.

automation cannot be applied to the control

B.

business benefits exceed the loss exposure.

C.

the end-user license agreement has expired.

D.

the control is difficult to enforce in practice.

Full Access
Question # 450

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?

A.

Network monitoring infrastructure

B.

Centralized vulnerability management

C.

Incident management process

D.

Centralized log management

Full Access
Question # 451

Which of the following BEST supports ethical IT risk management practices?

A.

Robust organizational communication channels

B.

Mapping of key risk indicators (KRIs) to corporate strategy

C.

Capability maturity models integrated with risk management frameworks

D.

Rigorously enforced operational service level agreements (SLAs)

Full Access
Question # 452

Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?

A.

Risk monitoring

B.

Risk mitigation

C.

Risk aggregation

D.

Risk assessment

Full Access
Question # 453

Which of the following is the BEST way for an organization to enable risk treatment decisions?

A.

Allocate sufficient funds for risk remediation.

B.

Promote risk and security awareness.

C.

Establish clear accountability for risk.

D.

Develop comprehensive policies and standards.

Full Access
Question # 454

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

A.

Identifying tweets that may compromise enterprise architecture (EA)

B.

Including diverse Business scenarios in user acceptance testing (UAT)

C.

Performing risk assessments during the business case development stage

D.

Including key stakeholders in review of user requirements

Full Access
Question # 455

Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?

A.

Key risk indicators (KRIs)

B.

Risk scenarios

C.

Business impact analysis (BIA)

D.

Threat analysis

Full Access
Question # 456

The risk associated with an asset after controls are applied can be expressed as:

A.

a function of the cost and effectiveness of controls.

B.

the likelihood of a given threat.

C.

a function of the likelihood and impact.

D.

the magnitude of an impact.

Full Access
Question # 457

Which of the following approaches would BEST help to identify relevant risk scenarios?

A.

Engage line management in risk assessment workshops.

B.

Escalate the situation to risk leadership.

C.

Engage internal audit for risk assessment workshops.

D.

Review system and process documentation.

Full Access
Question # 458

Controls should be defined during the design phase of system development because:

A.

it is more cost-effective to determine controls in the early design phase.

B.

structured analysis techniques exclude identification of controls.

C.

structured programming techniques require that controls be designed before coding begins.

D.

technical specifications are defined during this phase.

Full Access
Question # 459

Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?

A.

Results of current and past risk assessments

B.

Organizational strategy and objectives

C.

Lessons learned from materialized risk scenarios

D.

Internal and external audit findings

Full Access
Question # 460

Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?

A.

Enhance the security awareness program.

B.

Increase the frequency of incident reporting.

C.

Purchase cyber insurance from a third party.

D.

Conduct a control assessment.

Full Access
Question # 461

An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?

A.

Conduct a risk assessment.

B.

Update the security strategy.

C.

Implement additional controls.

D.

Update the risk register.

Full Access
Question # 462

Which of the following would qualify as a key performance indicator (KPI)?

A.

Aggregate risk of the organization

B.

Number of identified system vulnerabilities

C.

Number of exception requests processed in the past 90 days

D.

Number of attacks against the organization's website

Full Access
Question # 463

The maturity of an IT risk management program is MOST influenced by:

A.

the organization's risk culture

B.

benchmarking results against similar organizations

C.

industry-specific regulatory requirements

D.

expertise available within the IT department

Full Access
Question # 464

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

A.

A privacy impact assessment has not been completed.

B.

Data encryption methods apply to a subset of Pll obtained.

C.

The data privacy officer was not consulted.

D.

Insufficient access controls are used on the loT devices.

Full Access
Question # 465

A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?

A.

Aggregated key performance indicators (KPls)

B.

Key risk indicators (KRIs)

C.

Centralized risk register

D.

Risk heat map

Full Access
Question # 466

During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?

A.

Recommend risk remediation of the ineffective controls.

B.

Compare the residual risk to the current risk appetite.

C.

Determine the root cause of the control failures.

D.

Escalate the control failures to senior management.

Full Access
Question # 467

Whose risk tolerance matters MOST when making a risk decision?

A.

Customers who would be affected by a breach

B.

Auditors, regulators and standards organizations

C.

The business process owner of the exposed assets

D.

The information security manager

Full Access
Question # 468

After identifying new risk events during a project, the project manager s NEXT step should be to:

A.

determine if the scenarios need 10 be accepted or responded to.

B.

record the scenarios into the risk register.

C.

continue with a qualitative risk analysis.

D.

continue with a quantitative risk analysis.

Full Access
Question # 469

A maturity model will BEST indicate:

A.

confidentiality and integrity.

B.

effectiveness and efficiency.

C.

availability and reliability.

D.

certification and accreditation.

Full Access
Question # 470

When reviewing a risk response strategy, senior management's PRIMARY focus should be placed on the:

A.

cost-benefit analysis.

B.

investment portfolio.

C.

key performance indicators (KPIs).

D.

alignment with risk appetite.

Full Access