Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > Isaca Certification > CRISC

CRISC Certified in Risk and Information Systems Control Question and Answers

Question # 4

An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?

A.

IT infrastructure head

B.

Human resources head

C.

Supplier management head

D.

Application development head

Full Access
Question # 5

Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?

A.

To ensure emerging risk is identified and monitored

B.

To establish the maturity level of risk assessment processes

C.

To promote a risk-aware culture among staff

D.

To ensure risk trend data is collected and reported

Full Access
Question # 6

Which of the following controls will BEST mitigate risk associated with excessive access privileges?

A.

Review of user access logs

B.

Frequent password expiration

C.

Separation of duties

D.

Entitlement reviews

Full Access
Question # 7

An organization is considering the adoption of an aggressive business strategy to achieve desired growth From a risk management perspective what should the risk practitioner do NEXT?

A.

Identify new threats resorting from the new business strategy

B.

Update risk awareness training to reflect current levels of risk appetite and tolerance

C.

Inform the board of potential risk scenarios associated with aggressive business strategies

D.

Increase the scale for measuring impact due to threat materialization

Full Access
Question # 8

Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?

A.

Review risk tolerance levels

B.

Maintain the current controls.

C.

Analyze the effectiveness of controls.

D.

Execute the risk response plan

Full Access
Question # 9

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery ' ?

A.

Implement a release and deployment plan

B.

Conduct comprehensive regression testing.

C.

Develop enterprise-wide key risk indicators (KRls)

D.

Include business management on a weekly risk and issues report

Full Access
Question # 10

Which of the following is the BEST way to incorporate continuous monitoring in IT risk policies?

A.

Implement a governance, risk, and compliance (GRC) tool

B.

Establish a cross-functional risk steering committee to oversee risk initiatives.

C.

Define how risk thresholds are aligned with organizational objectives.

D.

Standardize IT risk mitigation for better monitoring of IT risk.

Full Access
Question # 11

Which of the following is the MAIN reason to continuously monitor IT-related risk?

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization ' s risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Full Access
Question # 12

Which of the following would be a risk practitioner ' s GREATEST concern with the use of a vulnerability scanning tool?

A.

Increased time to remediate vulnerabilities

B.

Inaccurate reporting of results

C.

Increased number of vulnerabilities

D.

Network performance degradation

Full Access
Question # 13

The BEST reason to classify IT assets during a risk assessment is to determine the:

A.

priority in the risk register.

B.

business process owner.

C.

enterprise risk profile.

D.

appropriate level of protection.

Full Access
Question # 14

After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:

Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor ' s control environment?

A.

External audit

B.

Internal audit

C.

Vendor performance scorecard

D.

Regulatory examination

Full Access
Question # 15

Which of the following is the MOST important metric to monitor the performance of the change management process?

A.

Percentage of changes having separation of duties in code deployment

B.

Percentage of changes having completed post-implementation verification

C.

Percentage of changes having user acceptance testing (UAT) sign-off

D.

Percentage of changes having to invoke the rollback plan

Full Access
Question # 16

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.

Control owner

B.

Risk owner

C.

Internal auditor

D.

Compliance manager

Full Access
Question # 17

Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?

A.

Scalable infrastructure

B.

A hot backup site

C.

Transaction limits

D.

Website activity monitoring

Full Access
Question # 18

Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?

A.

Updating the threat inventory with new threats

B.

Automating log data analysis

C.

Preventing the generation of false alerts

D.

Determining threshold levels

Full Access
Question # 19

Which of the following is a risk practitioner ' s MOST important action to reduce the likelihood of internal fraud?

A.

Recommend fraud awareness training for staff

B.

Communicate legal consequences for internal fraud.

C.

Update the internal fraud risk likelihood in the risk register.

D.

Verify the effectiveness of separation of duties.

Full Access
Question # 20

A business delegates its application data management to the internal IT team. Which of the following is the role of the internal IT team in this situation?

A.

Data controllers

B.

Data custodians

C.

Data analysts

D.

Data owners

Full Access
Question # 21

When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:

A.

business process owners.

B.

representative data sets.

C.

industry benchmark data.

D.

data automation systems.

Full Access
Question # 22

Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?

A.

Transfer the risk.

B.

Perform a gap analysis.

C.

Determine risk appetite for the new regulation.

D.

Implement specific monitoring controls.

Full Access
Question # 23

Which of the following BEST facilitates the development of effective IT risk scenarios?

A.

Utilization of a cross-functional team

B.

Participation by IT subject matter experts

C.

Integration of contingency planning

D.

Validation by senior management

Full Access
Question # 24

Which of the following would be the BEST senior management action to influence a strong risk-aware culture within an organization?

A.

Initiating disciplinary actions against individuals causing incidents

B.

Identifying the root cause of incidents

C.

Sponsoring changes to prevent recurrence of incidents

D.

Reviewing the risk register and preparing incident reports

Full Access
Question # 25

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

A.

Information security officer

B.

IT risk manager

C.

Business owner

D.

Chief risk officer (CRO)

Full Access
Question # 26

Which of the following controls would BEST reduce the risk of account compromise?

A.

Enforce password changes.

B.

Enforce multi-factor authentication (MFA).

C.

Enforce role-based authentication.

D.

Enforce password encryption.

Full Access
Question # 27

Which of the following provides the MOST comprehensive information when developing a risk profile for a system?

A.

Results of a business impact analysis (BIA)

B.

Risk assessment results

C.

A mapping of resources to business processes

D.

Key performance indicators (KPIs)

Full Access
Question # 28

A risk practitioner notices a risk scenario associated with data loss at the organization ' s cloud provider is assigned to the provider who should the risk scenario be reassigned to.

A.

Senior management

B.

Chief risk officer (CRO)

C.

Vendor manager

D.

Data owner

Full Access
Question # 29

A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?

A.

Recommend avoiding the risk.

B.

Validate the risk response with internal audit.

C.

Update the risk register.

D.

Evaluate outsourcing the process.

Full Access
Question # 30

WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?

A.

Enforce sanctions for noncompliance with security procedures.

B.

Conduct organization-w > de phishing simulations.

C.

Require training on the data handling policy.

D.

Require regular testing of the data breach response plan.

Full Access
Question # 31

Which of the following provides the MOST important information to facilitate a risk response decision?

A.

Audit findings

B.

Risk appetite

C.

Key risk indicators

D.

Industry best practices

Full Access
Question # 32

Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?

A.

To ensure risk owners understand their responsibilities

B.

To ensure IT risk is managed within acceptable limits

C.

To ensure the organization complies with legal requirements

D.

To ensure the IT risk awareness program is effective

Full Access
Question # 33

Which of the following is MOST important information to review when developing plans for using emerging technologies?

A.

Existing IT environment

B.

IT strategic plan

C.

Risk register

D.

Organizational strategic plan

Full Access
Question # 34

Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?

A.

Ensuring availability of resources for log analysis

B.

Implementing log analysis tools to automate controls

C.

Ensuring the control is proportional to the risk

D.

Building correlations between logs collected from different sources

Full Access
Question # 35

Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?

A.

It contains vulnerabilities and threats.

B.

The risk methodology is intellectual property.

C.

Contents may be used as auditable findings.

D.

Risk scenarios may be misinterpreted.

Full Access
Question # 36

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

A.

Monitoring

B.

Analysis

C.

Identification

D.

Response selection

Full Access
Question # 37

A key performance indicator (KPI) has been established to monitor the number of software changes that fail and must be re-implemented. An increase in the KPI indicates an ineffective:

A.

corrective control.

B.

preventive control.

C.

administrative control.

D.

deterrent control.

Full Access
Question # 38

Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:

A.

communicate risk trends to stakeholders.

B.

assign ownership of emerging risk scenarios.

C.

highlight noncompliance with the risk policy

D.

identify threats to emerging technologies.

Full Access
Question # 39

Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?

A.

Number of tickets for provisioning new accounts

B.

Average time to provision user accounts

C.

Password reset volume per month

D.

Average account lockout time

Full Access
Question # 40

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

A.

Continuous monitoring

B.

A control self-assessment

C.

Transaction logging

D.

Benchmarking against peers

Full Access
Question # 41

Which of the following is the MOST important consideration for protecting data assets m a Business application system?

A.

Application controls are aligned with data classification lutes

B.

Application users are periodically trained on proper data handling practices

C.

Encrypted communication is established between applications and data servers

D.

Offsite encrypted backups are automatically created by the application

Full Access
Question # 42

Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?

A.

Information security manager

B.

IT vendor manager

C.

Business process owner

D.

IT compliance manager

Full Access
Question # 43

Which of the following is MOST important when creating a program to reduce ethical risk?

A.

Defining strict policies

B.

Developing an organizational communication plan

C.

Conducting a gap analysis

D.

Obtaining senior management commitment

Full Access
Question # 44

Which of the following BEST assists in justifying an investment in automated controls?

A.

Cost-benefit analysis

B.

Alignment of investment with risk appetite

C.

Elimination of compensating controls

D.

Reduction in personnel costs

Full Access
Question # 45

Which of the following scenarios is MOST likely to cause a risk practitioner to request a formal risk acceptance sign-off?

A.

Residual risk in excess of the risk appetite cannot be mitigated.

B.

Inherent risk is too high, resulting in the cancellation of an initiative.

C.

Risk appetite has changed to align with organizational objectives.

D.

Residual risk remains at the same level over time without further mitigation.

Full Access
Question # 46

To enable effective integration of IT risk scenarios and enterprise risk management (ERM), it is MOST important to have a consistent approach to reporting:

A.

Key risk indicators (KRIs).

B.

Risk velocity.

C.

Risk response plans and owners.

D.

Risk impact and likelihood.

Full Access
Question # 47

A risk practitioner has been asked to mark an identified control deficiency as remediated, despite concerns that the risk level is still too high. Which of the following is the BEST way to address this concern?

A.

Prepare a risk acceptance proposal for senior management ' s consideration.

B.

Review the organization ' s risk appetite and tolerance.

C.

Assess the residual risk against the organization ' s risk appetite.

D.

Recommend implementation of additional compensating controls.

Full Access
Question # 48

Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?

A.

Single loss expectancy (SLE)

B.

Cost of the information system

C.

Availability of additional compensating controls

D.

Potential business impacts are within acceptable levels

Full Access
Question # 49

Which of the following should be the PRIMARY input when designing IT controls?

A.

Benchmark of industry standards

B.

Internal and external risk reports

C.

Recommendations from IT risk experts

D.

Outcome of control self-assessments

Full Access
Question # 50

Which of the following should be a risk practitioner ' s NEXT step after learning of an incident that has affected a competitor?

A.

Activate the incident response plan.

B.

Implement compensating controls.

C.

Update the risk register.

D.

Develop risk scenarios.

Full Access
Question # 51

An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?

A.

Number of customer records held

B.

Number of databases that host customer data

C.

Number of encrypted customer databases

D.

Number of staff members having access to customer data

Full Access
Question # 52

Which of the following will MOST improve stakeholders ' understanding of the effect of a potential threat?

A.

Establishing a risk management committee

B.

Updating the organization ' s risk register to reflect the new threat

C.

Communicating the results of the threat impact analysis

D.

Establishing metrics to assess the effectiveness of the responses

Full Access
Question # 53

Which of the following is the BEST indication of the effectiveness of a business continuity program?

A.

Business continuity tests are performed successfully and issues are addressed.

B.

Business impact analyses are reviewed and updated in a timely manner.

C.

Business continuity and disaster recovery plans are regularly updated.

D.

Business units are familiar with the business continuity plans and process.

Full Access
Question # 54

Which of the following is the PRIMARY role of the second line when an IT risk management framework is adopted?

A.

Overseeing the execution of framework requirements

B.

Implementing the framework requirements

C.

Advising industry standard framework organizations

D.

Auditing the execution of framework requirements

Full Access
Question # 55

What is the BEST course of action when the business impact of a risk event is rated high, but the likelihood of risk materialization has decreased?

A.

Adjust risk tolerance thresholds.

B.

Adjust the associated key risk indicator (KRI).

C.

Further mitigate the risk.

D.

Accept the risk if within tolerance.

Full Access
Question # 56

Which of the following is MOST important to understand when determining an appropriate risk assessment approach?

A.

Complexity of the IT infrastructure

B.

Value of information assets

C.

Management culture

D.

Threats and vulnerabilities

Full Access
Question # 57

Which of the following is the BEST indicator of executive management ' s support for IT risk mitigation efforts?

A.

The number of stakeholders involved in IT risk identification workshops

B.

The percentage of corporate budget allocated to IT risk activities

C.

The percentage of incidents presented to the board

D.

The number of executives attending IT security awareness training

Full Access
Question # 58

An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?

A.

Move redundant IT infrastructure to a closer location.

B.

Obtain insurance and ensure sufficient funds are available for disaster recovery.

C.

Review the business continuity plan (BCP) and align it with the new business needs.

D.

Outsource disaster recovery services to a third-party IT service provider.

Full Access
Question # 59

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

A.

chief risk officer.

B.

project manager.

C.

chief information officer.

D.

business process owner.

Full Access
Question # 60

Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

A.

To provide input to the organization ' s risk appetite

B.

To monitor the vendor ' s control effectiveness

C.

To verify the vendor ' s ongoing financial viability

D.

To assess the vendor ' s risk mitigation plans

Full Access
Question # 61

Which of the following is the BEST way to assess the effectiveness of an access management process?

A.

Comparing the actual process with the documented process

B.

Reviewing access logs for user activity

C.

Reconciling a list of accounts belonging to terminated employees

D.

Reviewing for compliance with acceptable use policy

Full Access
Question # 62

Which of the following controls BEST helps to ensure that transaction data reaches its destination?

A.

Securing the network from attacks

B.

Providing acknowledgments from receiver to sender

C.

Digitally signing individual messages

D.

Encrypting data-in-transit

Full Access
Question # 63

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner ' s NEXT step?

A.

Develop a mechanism for monitoring residual risk.

B.

Update the risk register with the results.

C.

Prepare a business case for the response options.

D.

Identify resources for implementing responses.

Full Access
Question # 64

Which of the following is the BEST indication that an organization ' s IT asset life cycle is poorly managed?

A.

Increased hardware maintenance costs

B.

Sensitive data found on discarded devices

C.

Lack of asset labeling

D.

Inadequate employee training

Full Access
Question # 65

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Full Access
Question # 66

Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:

A.

line management.

B.

the IT risk function.

C.

enterprise compliance.

D.

internal audit.

Full Access
Question # 67

Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?

A.

Perform a gap analysis.

B.

Prioritize impact to the business units.

C.

Perform a risk assessment.

D.

Review the risk tolerance and appetite.

Full Access
Question # 68

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner ' s BEST course of action?

A.

Collaborate with the risk owner to determine the risk response plan.

B.

Document the gap in the risk register and report to senior management.

C.

Include a right to audit clause in the service provider contract.

D.

Advise the risk owner to accept the risk.

Full Access
Question # 69

An organization ' s financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?

A.

IT risk manager

B.

IT system owner

C.

Information security manager

D.

Business owner

Full Access
Question # 70

Which of the following BEST enables a risk practitioner to plan a vulnerability assessment that aligns to detailed organizational requirements?

A.

Industry best practices

B.

Standards

C.

Policies

D.

Procedures

Full Access
Question # 71

Which of the following changes would be reflected in an organization ' s risk profile after the failure of a critical patch implementation?

A.

Risk tolerance is decreased.

B.

Residual risk is increased.

C.

Inherent risk is increased.

D.

Risk appetite is decreased

Full Access
Question # 72

Risk management strategies are PRIMARILY adopted to:

A.

take necessary precautions for claims and losses.

B.

achieve acceptable residual risk levels.

C.

avoid risk for business and IT assets.

D.

achieve compliance with legal requirements.

Full Access
Question # 73

A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?

A.

Undertake control self-assessments (CSAs)

B.

Require reports from staff with multiple duties

C.

Obtain independent analysis of transaction logs

D.

Assign activities to fewer employees

Full Access
Question # 74

When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:

A.

cost-benefit analysis.

B.

risk appetite.

C.

regulatory guidelines

D.

control efficiency

Full Access
Question # 75

An organization has implemented immutable backups to prevent successful ransomware attacks. Which of the following is the MOST effective control for the risk practitioner to review?

A.

Data recovery testing of the backups

B.

Physical security of the backups

C.

Configuration of the backup solution

D.

Retention policy for the backups

Full Access
Question # 76

A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner ' s PRIMARY concern?

A.

Sensitivity of the data

B.

Readability of test data

C.

Security of the test environment

D.

Availability of data to authorized staff

Full Access
Question # 77

Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?

A.

KCIs are independent from KRIs KRIs.

B.

KCIs and KRIs help in determining risk appetite.

C.

KCIs are defined using data from KRIs.

D.

KCIs provide input for KRIs

Full Access
Question # 78

During a data loss incident, which role in the RACI chart would be aligned to the risk practitioner?

A.

Responsible

B.

Accountable

C.

Informed

D.

Consulted

Full Access
Question # 79

Which of the following is the PRIMARY concern for a risk practitioner regarding an organization ' s adoption of innovative big data analytics capabilities?

A.

It may be expensive to maintain a data lake.

B.

It may be difficult to find experts who can develop analytical queries.

C.

There may be a lack of documented processes for big data analysis.

D.

Analytics methods may identify someone who was previously de-identified.

Full Access
Question # 80

Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?

A.

Emphasis on multiple application testing cycles

B.

Lack of an integrated development environment (IDE) tool

C.

Introduction of requirements that have not been approved

D.

Bypassing quality requirements before go-live

Full Access
Question # 81

Which of the following is the MOST important consideration when developing an organization ' s risk taxonomy?

A.

Leading industry frameworks

B.

Business context

C.

Regulatory requirements

D.

IT strategy

Full Access
Question # 82

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 83

Which of the following is the MOST important benefit of reporting risk assessment results to senior management?

A.

Promotion of a risk-aware culture

B.

Compilation of a comprehensive risk register

C.

Alignment of business activities

D.

Facilitation of risk-aware decision making

Full Access
Question # 84

Which of the following is MOST important to consider when determining a recovery time objective (RTO)?

A.

Time between backups for critical data

B.

Sensitivity of business data involved

C.

Cost of downtime due to a disaster

D.

Maximum tolerable data loss after an incident

Full Access
Question # 85

Which of the following BEST enables effective risk-based decision making?

A.

Performing threat modeling to understand the threat landscape

B.

Minimizing the number of risk scenarios for risk assessment

C.

Aggregating risk scenarios across a key business unit

D.

Ensuring the risk register is updated to reflect changes in risk factors

Full Access
Question # 86

Which of the following is the MOST effective way to mitigate identified risk scenarios?

A.

Assign ownership of the risk response plan

B.

Provide awareness in early detection of risk.

C.

Perform periodic audits on identified risk.

D.

areas Document the risk tolerance of the organization.

Full Access
Question # 87

Which of the following should be determined FIRST when a new security vulnerability is made public?

A.

How severe the vulnerability is across the industry

B.

Whether the affected technology is internet-facing

C.

Whether the affected technology is used within the organization

D.

What mitigating controls are currently in place

Full Access
Question # 88

Which of the following situations reflects residual risk?

A.

Risk that is present before risk acceptance has been finalized

B.

Risk that is removed after a risk acceptance has been finalized

C.

Risk that is present before mitigation controls have been applied

D.

Risk that remains after mitigation controls have been applied

Full Access
Question # 89

Which of the following is the result of a realized risk scenario?

A.

Technical event

B.

Threat event

C.

Vulnerability event

D.

Loss event

Full Access
Question # 90

Which of the following is MOST likely to be identified from an information systems audit report?

A.

Resiliency

B.

Regulatory requirements

C.

Data ownership

D.

Vulnerabilities

Full Access
Question # 91

Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?

A.

Risk taxonomy

B.

Risk response

C.

Risk appetite

D.

Risk ranking

Full Access
Question # 92

Identifying which of the following would BEST help an organization define an IT asset ' s criticality?

A.

Data classification policy

B.

Number of business users

C.

The asset ' s end of life status

D.

Business processes

Full Access
Question # 93

Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?

A.

Number of active nodes

B.

Blockchain size in gigabytes

C.

Average transaction speed

D.

Number of validated transactions

Full Access
Question # 94

A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:

A.

obtain management approval for policy exception.

B.

develop an improved password software routine.

C.

select another application with strong password controls.

D.

continue the implementation with no changes.

Full Access
Question # 95

Which of the following is the GREATEST risk associated with the use of data analytics?

A.

Distributed data sources

B.

Manual data extraction

C.

Incorrect data selection

D.

Excessive data volume

Full Access
Question # 96

Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?

A.

Segregation of duties

B.

Code review

C.

Change management

D.

Audit modules

Full Access
Question # 97

Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?

A.

Definition of disaster recovery plan (DRP) scope and key stakeholders

B.

Recovery time and maximum acceptable data loss thresholds

C.

A checklist including equipment, location of data backups, and backup sites

D.

A list of business areas and critical functions subject to risk analysis

Full Access
Question # 98

Which of the following would MOST likely cause management to unknowingly accept excessive risk?

A.

Satisfactory audit results

B.

Risk tolerance being set too low

C.

Inaccurate risk ratings

D.

Lack of preventive controls

Full Access
Question # 99

An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?

A.

Percentage of standard supplier uptime

B.

Average time to respond to incidents

C.

Number of assets included in recovery processes

D.

Number of key applications hosted

Full Access
Question # 100

Which of the following is the BEST way to identify changes in the risk profile of an organization?

A.

Monitor key risk indicators (KRIs).

B.

Monitor key performance indicators (KPIs).

C.

Interview the risk owner.

D.

Conduct a gap analysis

Full Access
Question # 101

Which of the following is the MOST important consideration when establishing a recovery point objective (RPO)?

A.

Latency of the alternate site

B.

Amount of acceptable data loss

C.

Time and resources for offsite backups

D.

Cost of testing the business continuity plan (BCP)

Full Access
Question # 102

Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?

A.

Hosted data

B.

Platforms

C.

Containers

D.

Security logs

Full Access
Question # 103

The annualized loss expectancy (ALE) method of risk analysis:

A.

helps in calculating the expected cost of controls

B.

uses qualitative risk rankings such as low. medium and high.

C.

can be used m a cost-benefit analysts

D.

can be used to determine the indirect business impact.

Full Access
Question # 104

The MOST important objective of information security controls is to:

A.

Identify threats and vulnerability

B.

Ensure alignment with industry standards

C.

Provide measurable risk reduction

D.

Enforce strong security solutions

Full Access
Question # 105

Mitigating technology risk to acceptable levels should be based PRIMARILY upon:

A.

organizational risk appetite.

B.

business sector best practices.

C.

business process requirements.

D.

availability of automated solutions

Full Access
Question # 106

IT risk assessments can BEST be used by management:

A.

for compliance with laws and regulations

B.

as a basis for cost-benefit analysis.

C.

as input for decision-making

D.

to measure organizational success.

Full Access
Question # 107

Of the following, who should be responsible for determining the inherent risk rating of an application?

A.

Application owner

B.

Senior management

C.

Risk practitioner

D.

Business process owner

Full Access
Question # 108

An organization ' s stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

A.

Escalate to senior management.

B.

Identify a risk transfer option.

C.

Reassess risk scenarios.

D.

Benchmark with similar industries.

Full Access
Question # 109

Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?

A.

To identify gaps in data protection controls

B.

To develop a customer notification plan

C.

To identify personally identifiable information (Pll)

D.

To determine gaps in data identification processes

Full Access
Question # 110

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

A.

Cost of offsite backup premises

B.

Cost of downtime due to a disaster

C.

Cost of testing the business continuity plan

D.

Response time of the emergency action plan

Full Access
Question # 111

After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?

A.

Escalate the issue to the service provider.

B.

Re-certify the application access controls.

C.

Remove the developer ' s access.

D.

Review the results of pre-migration testing.

Full Access
Question # 112

An organization ' s Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?

A.

Risk owner

B.

IT risk manager

C.

Server administrator

D.

Risk practitioner

Full Access
Question # 113

Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?

A.

It provides a cost-benefit analysis on control options available for implementation.

B.

It provides a view on where controls should be applied to maximize the uptime of servers.

C.

It provides historical information about the impact of individual servers malfunctioning.

D.

It provides a comprehensive view of the impact should the servers simultaneously fail.

Full Access
Question # 114

Who should be responsible for approving the cost of controls to be implemented for mitigating risk?

A.

Risk practitioner

B.

Risk owner

C.

Control owner

D.

Control implementer

Full Access
Question # 115

Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?

A.

Risk owner

B.

Risk practitioner

C.

Compliance manager

D.

Control owner

Full Access
Question # 116

When evaluating a number of potential controls for treating risk, it is MOST important to consider:

A.

risk appetite and control efficiency.

B.

inherent risk and control effectiveness.

C.

residual risk and cost of control.

D.

risk tolerance and control complexity.

Full Access
Question # 117

Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?

A.

Internal auditor

B.

Asset owner

C.

Finance manager

D.

Control owner

Full Access
Question # 118
A.

Key performance indicators (KPIs)

B.

Key risk indicator (KRI) thresholds

C.

Risk trends

D.

Risk objectives

Full Access
Question # 119

Which of the following is the MOST effective way to minimize the impact associated with the loss of key employees?

A.

Maintain and publish a RACI chart.

B.

Promote incentive programs.

C.

Perform succession planning.

D.

Develop a robust onboarding program.

Full Access
Question # 120

Which of the following is the GREATEST benefit of reviewing security trends reported by a log monitoring system?

A.

Identification of process weaknesses

B.

Assessment of system performance

C.

Confirmation that risk is at acceptable levels

D.

Identification of emerging risk scenarios

Full Access
Question # 121

An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?

A.

The third party s management

B.

The organization ' s management

C.

The control operators at the third party

D.

The organization ' s vendor management office

Full Access
Question # 122

Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?

A.

Accountability may not be clearly defined.

B.

Risk ratings may be inconsistently applied.

C.

Different risk taxonomies may be used.

D.

Mitigation efforts may be duplicated.

Full Access
Question # 123

Which of the following would require updates to an organization ' s IT risk register?

A.

Discovery of an ineffectively designed key IT control

B.

Management review of key risk indicators (KRls)

C.

Changes to the team responsible for maintaining the register

D.

Completion of the latest internal audit

Full Access
Question # 124

Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?

A.

Qualitative measures for potential loss events

B.

Changes in owners for identified IT risk scenarios

C.

Changes in methods used to calculate probability

D.

Frequent use of risk acceptance as a treatment option

Full Access
Question # 125

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization ' s network?

A.

Network monitoring infrastructure

B.

Centralized vulnerability management

C.

Incident management process

D.

Centralized log management

Full Access
Question # 126

Read " rights to application files in a controlled server environment should be approved by the:

A.

business process owner.

B.

database administrator.

C.

chief information officer.

D.

systems administrator.

Full Access
Question # 127

Which of the following events is MOST likely to trigger the need to conduct a risk assessment?

A.

An incident resulting in data loss

B.

Changes in executive management

C.

Updates to the information security policy

D.

Introduction of a new product line

Full Access
Question # 128

Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?

A.

Scan end points for applications not included in the asset inventory.

B.

Prohibit the use of cloud-based virtual desktop software.

C.

Conduct frequent reviews of software licenses.

D.

Perform frequent internal audits of enterprise IT infrastructure.

Full Access
Question # 129

A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?

A.

Regulatory restrictions for cross-border data transfer

B.

Service level objectives in the vendor contract

C.

Organizational culture differences between each country

D.

Management practices within each company

Full Access
Question # 130

A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?

A.

The organization has incorporated blockchain technology in its operations.

B.

The organization has not reviewed its encryption standards.

C.

The organization has implemented heuristics on its network firewall.

D.

The organization has not adopted Infrastructure as a Service (laaS) for its operations.

Full Access
Question # 131

During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?

A.

Recommend risk remediation of the ineffective controls.

B.

Compare the residual risk to the current risk appetite.

C.

Determine the root cause of the control failures.

D.

Escalate the control failures to senior management.

Full Access
Question # 132

Which of the following is MOST important for a risk practitioner to verify when periodically reviewing risk response action plans?

A.

The action plans have documented schedules

B.

The action plans treat the corresponding risk

C.

Budget has been allocated for the action plans

D.

Key risk indicators (KRIs) are defined in the action plans

Full Access
Question # 133

Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?

A.

Percentage of IT systems recovered within the mean time to restore (MTTR) during the disaster recovery test

B.

Percentage of issues arising from the disaster recovery test resolved on time

C.

Percentage of IT systems included in the disaster recovery test scope

D.

Percentage of IT systems meeting the recovery time objective (RTO) during the disaster recovery test

Full Access
Question # 134

Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?

A.

Enable data wipe capabilities

B.

Penetration testing and session timeouts

C.

Implement remote monitoring

D.

Enforce strong passwords and data encryption

Full Access
Question # 135

Which of the following BEST indicates effective information security incident management?

A.

Monthly trend of information security-related incidents

B.

Average time to identify critical information security incidents

C.

Frequency of information security incident response plan testing

D.

Percentage of high-risk security incidents

Full Access
Question # 136

Improvements in the design and implementation of a control will MOST likely result in an update to:

A.

inherent risk.

B.

residual risk.

C.

risk appetite

D.

risk tolerance

Full Access
Question # 137

Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?

A.

Prioritizing risk within each business unit

B.

Reviewing risk ranking methodology

C.

Promoting an organizational culture of risk awareness

D.

Assigning risk ownership to appropriate roles

Full Access
Question # 138

Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?

A.

Multi-factor authentication

B.

Role-based access controls

C.

Activation of control audits

D.

Acceptable use policies

Full Access
Question # 139

Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?

A.

Potential audit findings

B.

Insufficient risk governance

C.

Potential business impact

D.

Inaccurate documentation

Full Access
Question # 140

Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?

A.

To define effective enterprise IT risk appetite and tolerance levels

B.

To execute the IT risk management strategy in support of business objectives

C.

To establish business-aligned IT risk management organizational structures

D.

To assess the capabilities and maturity of the organization’s IT risk management efforts

Full Access
Question # 141

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

A.

Conduct risk classification for associated IT controls.

B.

Determine whether risk responses still effectively address risk.

C.

Perform vulnerability and threat assessments.

D.

Analyze and update IT control assessments.

Full Access
Question # 142

A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner ' s BEST course of action?

A.

Determine changes in the risk level.

B.

Outsource the vulnerability management process.

C.

Review the patch management process.

D.

Add agenda item to the next risk committee meeting.

Full Access
Question # 143

A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?

A.

Negotiating terms of adoption

B.

Understanding the timeframe to implement

C.

Completing a gap analysis

D.

Initiating the conversion

Full Access
Question # 144

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization ' s risk appetite?

A.

Establishing a series of key risk indicators (KRIs).

B.

Adding risk triggers to entries in the risk register.

C.

Implementing key performance indicators (KPIs).

D.

Developing contingency plans for key processes.

Full Access
Question # 145

When reviewing a risk response strategy, senior management ' s PRIMARY focus should be placed on the:

A.

cost-benefit analysis.

B.

investment portfolio.

C.

key performance indicators (KPIs).

D.

alignment with risk appetite.

Full Access
Question # 146

The PRIMARY advantage of involving end users in continuity planning is that they:

A.

have a better understanding of specific business needs

B.

can balance the overall technical and business concerns

C.

can see the overall impact to the business

D.

are more objective than information security management.

Full Access
Question # 147

Which of the following is the PRIMARY concern related to using pseudonymization for the protection of an organization’s processed privacy data?

A.

Authorized users can access personal data.

B.

Updates to privacy data content are not allowed.

C.

Individual data subjects can be re-identified.

D.

Other information about the data subject can be revealed.

Full Access
Question # 148

Which of the following provides the MOST useful information when measuring the progress of risk response action plans?

A.

Results of risk remediation team interviews

B.

Annual loss expectancy (ALE) changes

C.

Vulnerability assessment results

D.

Percentage of mitigated risk scenarios

Full Access
Question # 149

A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?

A.

Risk impact

B.

Key risk indicator (KRI)

C.

Risk appetite

D.

Risk likelihood

Full Access
Question # 150

Which of the following is the BEST course of action to help reduce the probability of an incident recurring?

A.

Perform a risk assessment.

B.

Perform root cause analysis.

C.

Initiate disciplinary action.

D.

Update the incident response plan.

Full Access
Question # 151

An organization is measuring the effectiveness of its change management program to reduce the number of unplanned production changes. Which of the following would be the BEST metric to determine if the program is performing as expected?

A.

Decrease in the time to move changes to production

B.

Ratio of emergency fixes to total changes

C.

Ratio of system changes to total changes

D.

Decrease in number of changes without a fallback plan

Full Access
Question # 152

Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?

A.

Corporate incident escalation protocols are established.

B.

Exposure is integrated into the organization ' s risk profile.

C.

Risk appetite cascades to business unit management

D.

The organization-wide control budget is expanded.

Full Access
Question # 153

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Assigning a data owner

B.

Scheduling periodic audits

C.

Implementing technical controls over the assets

D.

Implementing a data loss prevention (DLP) solution

Full Access
Question # 154

Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?

A.

Reviewing the organization ' s policies and procedures

B.

Interviewing groups of key stakeholders

C.

Circulating questionnaires to key internal stakeholders

D.

Accepting IT personnel s view of business issues

Full Access
Question # 155

The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:

A.

the risk strategy is appropriate

B.

KRIs and KPIs are aligned

C.

performance of controls is adequate

D.

the risk monitoring process has been established

Full Access
Question # 156

An organization ' s risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?

A.

Top-down analysis

B.

Event tree analysis

C.

Control gap analysis

D.

Bottom-up analysis

Full Access
Question # 157

Which of the following MUST be updated to maintain an IT risk register?

A.

Expected frequency and potential impact

B.

Risk tolerance

C.

Enterprise-wide IT risk assessment

D.

Risk appetite

Full Access
Question # 158

Which of the following is the BEST way to validate privileged access to database accounts?

A.

Regular reviews of privileged access

B.

Confirmation from users with privileged access

C.

Management approval of access requests

D.

Confirmation from the database administrator (DBA)

Full Access
Question # 159

Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?

A.

Reviewing control objectives

B.

Aligning with industry best practices

C.

Consulting risk owners

D.

Evaluating KPIs in accordance with risk appetite

Full Access
Question # 160

The PRIMARY focus of an ongoing risk awareness program should be to:

A.

enable better risk-based decisions.

B.

define appropriate controls to mitigate risk.

C.

determine impact of risk scenarios.

D.

expand understanding of risk indicators.

Full Access
Question # 161

Risk mitigation is MOST effective when which of the following is optimized?

A.

Operational risk

B.

Residual risk

C.

Inherent risk

D.

Regulatory risk

Full Access
Question # 162

To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?

A.

The risk governance approach of the second and third lines of defense may differ.

B.

The independence of the internal third line of defense may be compromised.

C.

Cost reductions may negatively impact the productivity of other departments.

D.

The new structure is not aligned to the organization ' s internal control framework.

Full Access
Question # 163

Which of the following should be the PRIMARY objective of a risk awareness training program?

A.

To enable risk-based decision making

B.

To promote awareness of the risk governance function

C.

To clarify fundamental risk management principles

D.

To ensure sufficient resources are available

Full Access
Question # 164

While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:

A.

control is ineffective and should be strengthened

B.

risk is inefficiently controlled.

C.

risk is efficiently controlled.

D.

control is weak and should be removed.

Full Access
Question # 165

Which of the following BEST indicates that additional or improved controls ate needed m the environment?

A.

Management, has decreased organisational risk appetite

B.

The risk register and portfolio do not include all risk scenarios

C.

merging risk scenarios have been identified

D.

Risk events and losses exceed risk tolerance

Full Access
Question # 166

A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:

A.

risk score

B.

risk impact

C.

risk response

D.

risk likelihood.

Full Access
Question # 167

The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:

A.

vulnerability scans.

B.

recurring vulnerabilities.

C.

vulnerabilities remediated,

D.

new vulnerabilities identified.

Full Access
Question # 168

Which of the following would be MOST helpful when communicating roles associated with the IT risk management process?

A.

Skills matrix

B.

Job descriptions

C.

RACI chart

D.

Organizational chart

Full Access
Question # 169

Which of the following BEST enables an organization to address risk associated with technical complexity?

A.

Documenting system hardening requirements

B.

Minimizing dependency on technology

C.

Aligning with a security architecture

D.

Establishing configuration guidelines

Full Access
Question # 170

An organization is planning to implement a Zero Trust model. From a cybersecunty perspective, which of the following is MOST important to ensure successful alignment with the overall inten Zero Trust?

A.

Access policies

B.

Industry benchmarks

C.

Network compatibility

D.

Encryption algorithms

Full Access
Question # 171

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

A.

Replace the action owner with a more experienced individual.

B.

Implement compensating controls until the preferred action can be completed.

C.

Change the risk response strategy of the relevant risk to risk avoidance.

D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.

Full Access
Question # 172

Which of the following is the MOST important consideration for effectively maintaining a risk register?

A.

An IT owner is assigned for each risk scenario.

B.

The register is updated frequently.

C.

The register is shared with executive management.

D.

Compensating controls are identified.

Full Access
Question # 173

Which of the following is the FIRST step when developing a business case to drive the adoption of a risk remediation project by senior management?

A.

Calculating the cost

B.

Analyzing cost-effectiveness

C.

Determining the stakeholders

D.

Identifying the objectives

Full Access
Question # 174

A key risk indicator (KRI) for technology operations has been above risk thresholds for the last three reporting periods. What is the BEST way for a risk practitioner to address this concern?

A.

Adjust the original thresholds for the KRI for future reporting periods

B.

Initiate corrective actions with the accountable risk owner

C.

Implement forward-looking risk metrics to compare results

D.

Continue monitoring the KRI for changes in subsequent reporting periods

Full Access
Question # 175

When of the following provides the MOST tenable evidence that a business process control is effective?

A.

Demonstration that the control is operating as designed

B.

A successful walk-through of the associated risk assessment

C.

Management attestation that the control is operating effectively

D.

Automated data indicating that risk has been reduced

Full Access
Question # 176

Which of the following BEST indicates that an organization has implemented IT performance requirements?

A.

Service level agreements(SLA)

B.

Vendor references

C.

Benchmarking data

D.

Accountability matrix

Full Access
Question # 177

Which of the following would qualify as a key performance indicator (KPI)?

A.

Aggregate risk of the organization

B.

Number of identified system vulnerabilities

C.

Number of exception requests processed in the past 90 days

D.

Number of attacks against the organization ' s website

Full Access
Question # 178

Which of the following is a risk practitioner ' s BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?

A.

Rate the risk as high priority based on the severe impact.

B.

Obtain management ' s consent to accept the risk.

C.

Ignore the risk due to the extremely low likelihood.

D.

Address the risk by analyzing treatment options.

Full Access
Question # 179

Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?

A.

Conduct root cause analyses for risk events.

B.

Educate personnel on risk mitigation strategies.

C.

Integrate the risk event and incident management processes.

D.

Implement controls to prevent future risk events.

Full Access
Question # 180

An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?

A.

Redesign the heat map.

B.

Review the risk tolerance.

C.

Perform a business impact analysis (BIA)

D.

Update the risk register.

Full Access
Question # 181

During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?

A.

Include the new risk scenario in the current risk assessment.

B.

Postpone the risk assessment until controls are identified.

C.

Request the risk scenario be removed from the register.

D.

Exclude the new risk scenario from the current risk assessment

Full Access
Question # 182

Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?

A.

Facilitating risk-aware decision making by stakeholders

B.

Demonstrating management commitment to mitigate risk

C.

Closing audit findings on a timely basis

D.

Ensuring compliance to industry standards

Full Access
Question # 183

Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?

A.

To enable consistent data on risk to be obtained

B.

To allow for proper review of risk tolerance

C.

To identify dependencies for reporting risk

D.

To provide consistent and clear terminology

Full Access
Question # 184

A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

A.

IT infrastructure manager

B.

Chief Risk Officer (CRO)

C.

Business continuity manager

D.

Business application owner

Full Access
Question # 185

An organization ' s recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

A.

Failure to test the disaster recovery plan (DRP)

B.

Lack of well-documented business impact analysis (BIA)

C.

Lack of annual updates to the disaster recovery plan (DRP)

D.

Significant changes in management personnel

Full Access
Question # 186

A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?

A.

The alternative site is a hot site with equipment ready to resume processing immediately.

B.

The contingency plan provides for backup media to be taken to the alternative site.

C.

The contingency plan for high priority applications does not involve a shared cold site.

D.

The alternative site does not reside on the same fault to matter how the distance apart.

Full Access
Question # 187

Which of the following cloud service models is MOST appropriate for client organizations that want to maximize their control over management of the data life cycle?

A.

Data as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Full Access
Question # 188

Which of the following is the MOST effective way to help ensure an organization ' s current risk scenarios are relevant?

A.

Adoption of industry best practices

B.

Involvement of stakeholders in risk assessment

C.

Review of risk scenarios by independent parties

D.

Documentation of potential risk in business cases

Full Access
Question # 189

Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?

A.

Obtaining logs m an easily readable format

B.

Providing accurate logs m a timely manner

C.

Collecting logs from the entire set of IT systems

D.

implementing an automated log analysis tool

Full Access
Question # 190

An organization maintains independent departmental risk registers that are not automatically aggregated. Which of the following is the GREATEST concern?

A.

Management may be unable to accurately evaluate the risk profile.

B.

Resources may be inefficiently allocated.

C.

The same risk factor may be identified in multiple areas.

D.

Multiple risk treatment efforts may be initiated to treat a given risk.

Full Access
Question # 191

Which of the following is the BEST indication of a potential threat?

A.

Increase in identified system vulnerabilities

B.

Ineffective risk treatment plans

C.

Excessive policy and standard exceptions

D.

Excessive activity in system logs

Full Access
Question # 192

The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?

A.

The risk impact changes.

B.

The risk classification changes.

C.

The inherent risk changes.

D.

The residual risk changes.

Full Access
Question # 193

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?

A.

Develop new loT risk scenarios.

B.

Implement loT device monitoring software.

C.

Introduce controls to the new threat environment.

D.

Engage external security reviews.

Full Access
Question # 194

Which of the following is the BEST indicator of the effectiveness of a control?

A.

Scope of the control coverage

B.

The number of exceptions granted

C.

Number of steps necessary to operate process

D.

Number of control deviations detected

Full Access
Question # 195

Which of the following is MOST important to consider when selecting and designing key control indicators (KCIs)?

A.

The KCI can establish a formal correlation with relevant KRIs

B.

The KCI can demonstrate whether the control objective has been met

C.

The KCI can be implemented within the allocated budget

D.

The KCI can be measured using quantitative methods

Full Access
Question # 196

A PRIMARY advantage of involving business management in evaluating and managing risk is that management:

A.

better understands the system architecture.

B.

is more objective than risk management.

C.

can balance technical and business risk.

D.

can make better-informed business decisions.

Full Access
Question # 197

Which of the following is the MOST important data attribute of key risk indicators (KRIs)?

A.

The data is measurable.

B.

The data is calculated continuously.

C.

The data is relevant.

D.

The data is automatically produced.

Full Access
Question # 198

When determining risk ownership, the MAIN consideration should be:

A.

who owns the business process.

B.

the amount of residual risk.

C.

who is responsible for risk mitigation.

D.

the total cost of risk treatment.

Full Access
Question # 199

A risk practitioner learns of an urgent threat intelligence alert to patch a critical vulnerability identified in the organization ' s operating system. Which of the following should the risk practitioner do FIRST?

A.

Patch the operating system immediately

B.

Determine whether any active attacks are exploiting the vulnerability

C.

Invoke the organization ' s incident response plan

D.

Evaluate the threat in the context of the organization ' s IT environment

Full Access
Question # 200

In a DevOps environment, a container does not pass dynamic application security testing (DAST). How should this situation be categorized?

A.

As a risk event

B.

As a risk scenario

C.

As an incident

D.

As an error

Full Access
Question # 201

From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

A.

The organization gains assurance it can recover from a disaster

B.

Errors are discovered in the disaster recovery process.

C.

All business-critical systems are successfully tested.

D.

All critical data is recovered within recovery time objectives (RTOs).

Full Access
Question # 202

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

A.

Risk analysis results

B.

Exception handling policy

C.

Vulnerability assessment results

D.

Benchmarking assessments

Full Access
Question # 203

Which of the following deficiencies identified during a review of an organization ' s cybersecurity policy should be of MOST concern?

A.

The policy lacks specifics on how to secure the organization ' s systems from cyberattacks.

B.

The policy has gaps against relevant cybersecurity standards and frameworks.

C.

The policy has not been reviewed by the cybersecurity team in over a year.

D.

The policy has not been approved by the organization ' s board.

Full Access
Question # 204

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

A.

Percentage of IT assets with current malware definitions

B.

Number of false positives defected over a period of time

C.

Number of alerts generated by the anti-virus software

D.

Frequency of anti-vinjs software updates

Full Access
Question # 205

A risk practitioner has been notified that an employee sent an email in error containing customers ' personally identifiable information (Pll). Which of the following is the risk practitioner ' s BEST course of action?

A.

Report it to the chief risk officer.

B.

Advise the employee to forward the email to the phishing team.

C.

follow incident reporting procedures.

D.

Advise the employee to permanently delete the email.

Full Access
Question # 206

Which of the following is the MOST essential characteristic of a good IT risk scenario?

A.

The scenario is aligned to business control processes.

B.

The scenario is aligned to the organization’s risk appetite and tolerance.

C.

The scenario is aligned to a business objective.

D.

The scenario is aligned to known vulnerabilities in information technology.

Full Access
Question # 207

Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?

A.

Prepare a skills matrix to illustrate tasks and required expertise.

B.

Require periodic security assessments of the vendor within the contract.

C.

Perform due diligence to enable holistic assessment of the vendor.

D.

Plan a phased approach for the transition of processes to the vendor.

Full Access
Question # 208

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

A.

risk mitigation approach

B.

cost-benefit analysis.

C.

risk assessment results.

D.

vulnerability assessment results

Full Access
Question # 209

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Full Access
Question # 210

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.

Insurance coverage

B.

Security awareness training

C.

Policies and standards

D.

Risk appetite and tolerance

Full Access
Question # 211

An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?

A.

External resources may need to be involved.

B.

Data privacy regulations may be violated.

C.

Recovery costs may increase significantly.

D.

Service interruptions may be longer than anticipated.

Full Access
Question # 212

An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?

A.

Variances in recovery times

B.

Ownership assignment for controls

C.

New potentially disruptive scenarios

D.

Contractual changes with customers

Full Access
Question # 213

A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

A.

Enable data encryption in the test environment.

B.

Prevent the use of production data in the test environment

C.

De-identify data before being transferred to the test environment.

D.

Enforce multi-factor authentication within the test environment.

Full Access
Question # 214

An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?

A.

Require the vendor to degauss the hard drives

B.

Implement an encryption policy for the hard drives.

C.

Require confirmation of destruction from the IT manager.

D.

Use an accredited vendor to dispose of the hard drives.

Full Access
Question # 215

An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary ' s IT systems controls?

A.

Implement IT systems in alignment with business objectives.

B.

Review metrics and key performance indicators (KPIs).

C.

Review design documentation of IT systems.

D.

Evaluate compliance with legal and regulatory requirements.

Full Access
Question # 216

Continuous monitoring of key risk indicators (KRIs) will:

A.

ensure that risk will not exceed the defined risk appetite of the organization.

B.

provide an early warning so that proactive action can be taken.

C.

provide a snapshot of the risk profile.

D.

ensure that risk tolerance and risk appetite are aligned.

Full Access
Question # 217

Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?

A.

Changes in the organization ' s risk appetite and risk tolerance levels

B.

Impact due to changes in external and internal risk factors

C.

Changes in residual risk levels against acceptable levels

D.

Gaps in best practices and implemented controls across the industry

Full Access
Question # 218

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

A.

Validating employee social media accounts and passwords

B.

Monitoring Internet usage on employee workstations

C.

Disabling social media access from the organization ' s technology

D.

Implementing training and awareness programs

Full Access
Question # 219

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

A.

Approval by senior management

B.

Low cost of development and maintenance

C.

Sensitivity to changes in risk levels

D.

Use of industry risk data sources

Full Access
Question # 220

An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:

A.

mitigation.

B.

avoidance.

C.

transfer.

D.

acceptance.

Full Access
Question # 221

Which of the following is a risk practitioner ' s MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Full Access
Question # 222

Which of the following tasks should be completed prior to creating a disaster recovery plan (DRP)?

A.

Conducting a business impact analysis (BIA)

B.

Identifying the recovery response team

C.

Procuring a recovery site

D.

Assigning sensitivity levels to data

Full Access
Question # 223

The MOST important reason for implementing change control procedures is to ensure:

A.

only approved changes are implemented

B.

timely evaluation of change events

C.

an audit trail exists.

D.

that emergency changes are logged.

Full Access
Question # 224

The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:

A.

the proposed controls are implemented as scheduled.

B.

security controls are tested prior to implementation.

C.

compliance with corporate policies.

D.

the risk response strategy has been decided.

Full Access
Question # 225

An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner ' s NEXT course of action?

A.

Remove the associated risk from the register.

B.

Validate control effectiveness and update the risk register.

C.

Review the contract and service level agreements (SLAs).

D.

Obtain an assurance report from the third-party provider.

Full Access
Question # 226

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

A.

Initiate disciplinary action against the risk owner.

B.

Reassess the risk and review the underlying controls.

C.

Review organizational ethics policies.

D.

Report the activity to the supervisor.

Full Access
Question # 227

Who should be responsible for implementing and maintaining security controls?

A.

End user

B.

Internal auditor

C.

Data owner

D.

Data custodian

Full Access
Question # 228

Which of the following is a risk practitioner ' s BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Full Access
Question # 229

When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?

A.

Percentage of system uptime

B.

Percentage of relevant threats mitigated

C.

Total number of threats identified

D.

Reaction time of the system to threats

Full Access
Question # 230

A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?

A.

Business analyst

B.

Project sponsor

C.

IT project team

D.

IT project management office (PMO)

Full Access
Question # 231

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

A.

update the risk rating.

B.

reevaluate inherent risk.

C.

develop new risk scenarios.

D.

implement additional controls.

Full Access
Question # 232

when developing IT risk scenarios associated with a new line of business, which of the following would be MOST helpful to review?

A.

Organizational threats

B.

Resource allocation plan

C.

Competitor analysis

D.

Cost-benefit analysis

Full Access
Question # 233

Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?

A.

Requiring two-factor authentication

B.

Conducting security awareness training

C.

Implementing phishing simulations

D.

Updating the information security policy

Full Access
Question # 234

What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?

A.

Segment the system on its own network.

B.

Ensure regular backups take place.

C.

Virtualize the system in the cloud.

D.

Install antivirus software on the system.

Full Access
Question # 235

Which of the following BEST supports ethical IT risk management practices?

A.

Robust organizational communication channels

B.

Mapping of key risk indicators (KRIs) to corporate strategy

C.

Capability maturity models integrated with risk management frameworks

D.

Rigorously enforced operational service level agreements (SLAs)

Full Access
Question # 236

Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?

A.

Exposure of log data

B.

Lack of governance

C.

Increased number of firewall rules

D.

Lack of agreed-upon standards

Full Access
Question # 237

Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?

A.

Inherent risk and likelihood

B.

Management action plans associated with audit findings

C.

Residual risk relative to appetite and tolerance

D.

Key risk indicator (KRI) trends

Full Access
Question # 238

Recent changes in an organization ' s business strategy requires an application to increase its recovery point objective (RPO). Which of the following MUST be updated?

A.

IT inventory

B.

Business impact analysis (BIA)

C.

Risk register

D.

Configuration management database (CMDB)

Full Access
Question # 239

Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?

A.

Key risk indicators (KRIs)

B.

Risk scenarios

C.

Business impact analysis (BIA)

D.

Threat analysis

Full Access
Question # 240

Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?

A.

Data classification policy

B.

Emerging technology trends

C.

The IT strategic plan

D.

The risk register

Full Access
Question # 241

When reporting on the performance of an organization ' s control environment including which of the following would BEST inform stakeholders risk decision-making?

A.

The audit plan for the upcoming period

B.

Spend to date on mitigating control implementation

C.

A report of deficiencies noted during controls testing

D.

A status report of control deployment

Full Access
Question # 242

Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?

A.

Testing the transmission of credit card numbers

B.

Reviewing logs for unauthorized data transfers

C.

Configuring the DLP control to block credit card numbers

D.

Testing the DLP rule change control process

Full Access
Question # 243

Which of the following approaches will BEST help to ensure the effectiveness of risk awareness training?

A.

Piloting courses with focus groups

B.

Using reputable third-party training programs

C.

Reviewing content with senior management

D.

Creating modules for targeted audiences

Full Access
Question # 244

When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:

A.

is correlated to risk and tracks variances in the risk.

B.

is assigned to IT processes and projects with a low level of risk.

C.

has a high correlation with the process outcome.

D.

triggers response based on risk thresholds.

Full Access
Question # 245

Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?

A.

Change testing schedule

B.

Impact assessment of the change

C.

Change communication plan

D.

User acceptance testing (UAT)

Full Access
Question # 246

Which of the following BEST supports the communication of risk assessment results to stakeholders?

A.

Monitoring of high-risk areas

B.

Classification of risk profiles

C.

Periodic review of the risk register

D.

Assignment of risk ownership

Full Access
Question # 247

Which of the following would be of GREATEST concern regarding an organization ' s asset management?

A.

Lack of a mature records management program

B.

Lack of a dedicated asset management team

C.

Decentralized asset lists

D.

Incomplete asset inventory

Full Access
Question # 248

A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?

A.

Report the incident.

B.

Plan a security awareness session.

C.

Assess the new risk.

D.

Update the risk register.

Full Access
Question # 249

An organization does not have a defined process to revoke IT access of staff members who have changed roles within the organization. Which of the following is the GREATEST concern associated with this deficiency?

A.

Noncompliance with the access management policy

B.

Fraudulent insider activities

C.

Misaligned job duties

D.

Inefficient access review processes

Full Access
Question # 250

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

A.

Evaluate current risk management alignment with relevant regulations.

B.

Determine if business continuity procedures are reviewed and updated on a regular basis.

C.

Review the methodology used to conduct the business impact analysis (BIA).

D.

Conduct a benchmarking exercise against industry peers.

Full Access
Question # 251

Which of the following provides the BEST evidence that a selected risk treatment plan is effective?

A.

Identifying key risk indicators (KRIs)

B.

Evaluating the return on investment (ROI)

C.

Evaluating the residual risk level

D.

Performing a cost-benefit analysis

Full Access
Question # 252

Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?

A.

Number of days taken to remove access after staff separation dates

B.

Number of days taken for IT to remove access after receipt of HR instructions

C.

Number of termination requests processed per reporting period

D.

Number of days taken for HR to provide instructions to IT after staff separation dates

Full Access
Question # 253

Which of the following is the PRIMARY reason to compare the business impact analysis (BIA) against the organization ' s business continuity plan (BCP)?

A.

The results of the BIA quantify the BCP objectives and supporting technology for each operational area.

B.

The BCP provides detailed information on alternative facilities to use in case of business interruptions.

C.

The results of the BIA quantify the cost of the technology environment needed to restart each operational area.

D.

The BCP provides the backup and restoration procedures to follow in case of business interruptions.

Full Access
Question # 254

Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?

A.

Establish baseline security configurations with the cloud service provider.

B.

Require the cloud prowler 10 disclose past data privacy breaches.

C.

Ensure the cloud service provider performs an annual risk assessment.

D.

Specify cloud service provider liability for data privacy breaches in the contract

Full Access
Question # 255

Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization ' s key IT applications in a cloud environment?

A.

Reviewing the results of independent audits

B.

Performing a site visit to the cloud provider ' s data center

C.

Performing a due diligence review

D.

Conducting a risk workshop with key stakeholders

Full Access
Question # 256

Which of the following is the PRIMARY reason to obtain independent reviews of risk assessment and response mechanisms?

A.

To ensure risk thresholds are properly defined

B.

To minimize the subjectivity of risk assessment results

C.

To correct errors in the risk assessment process

D.

To validate impact and probability ratings

Full Access
Question # 257

To drive effective risk management, it is MOST important that an organization ' s policy framework is:

A.

Approved by relevant stakeholders.

B.

Aligned to the functional business structure.

C.

Included in employee onboarding materials.

D.

Mapped to an industry-standard framework.

Full Access
Question # 258

Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?

A.

Preventive

B.

Deterrent

C.

Compensating

D.

Detective

Full Access
Question # 259

An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?

A.

Sections of the policy that may justify not implementing the requirement

B.

Risk associated with the inability to implement the requirement

C.

Budget justification to implement the new requirement during the current year

D.

Industry best practices with respect to implementation of the proposed control

Full Access
Question # 260
A.

Strategic investment portfolio.

B.

Business impact analysis (BIA) results.

C.

Alignment with risk appetite.

D.

Key risk indicator (KRI) trends.

Full Access
Question # 261

Which of the following is the PRIMARY risk management responsibility of the third line of defense?

A.

Providing assurance of the effectiveness of risk management activities

B.

Providing guidance on the design of effective controls

C.

Providing advisory services on enterprise risk management (ERM)

D.

Providing benchmarking on other organizations ' risk management programs

Full Access
Question # 262

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Full Access
Question # 263

Which of the following BEST indicates the condition of a risk management program?

A.

Number of risk register entries

B.

Number of controls

C.

Level of financial support

D.

Amount of residual risk

Full Access
Question # 264

Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?

A.

Risk monitoring

B.

Risk mitigation

C.

Risk aggregation

D.

Risk assessment

Full Access
Question # 265

Which of the following should be the PRIMARY focus of an IT risk awareness program?

A.

Ensure compliance with the organization ' s internal policies

B.

Cultivate long-term behavioral change.

C.

Communicate IT risk policy to the participants.

D.

Demonstrate regulatory compliance.

Full Access
Question # 266

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

Full Access
Question # 267

Which of the following is MOST important to consider when selecting risk indicators (KRIs)? The ability to:

A.

Monitor the performance of a process

B.

Assess the risk associated with risk scenarios

C.

Measure changes in the threat landscape

D.

Refine the organization’s risk appetite

Full Access
Question # 268

Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?

A.

Cyber insurance

B.

Data backups

C.

Incident response plan

D.

Key risk indicators (KRIs)

Full Access
Question # 269

A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner ' s FIRST course of action?

A.

Reassess the risk profile.

B.

Modify the risk taxonomy.

C.

Increase the risk tolerance.

D.

Review the risk culture.

Full Access
Question # 270

Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?

A.

Impact analysis

B.

Control analysis

C.

Root cause analysis

D.

Threat analysis

Full Access
Question # 271

Which of the following is the MOST important benefit of implementing a data classification program?

A.

Reduction in data complexity

B.

Reduction in processing times

C.

Identification of appropriate ownership

D.

Identification of appropriate controls

Full Access
Question # 272

A risk practitioner is collaborating with key stakeholders to prioritize a large number of IT risk scenarios. Which scenarios should receive the PRIMARY focus?

A.

Scenarios with the highest number of open audit issues

B.

Scenarios with the highest frequency of incidents

C.

Scenarios with the largest budget allocation for risk mitigation

D.

Scenarios with the highest risk impact to the business

Full Access
Question # 273

Which of the following observations would be the GREATEST concern to a risk practitioner evaluating an organization ' s risk management practices?

A.

Senior management has approved numerous requests for risk acceptance.

B.

Business leaders provide final approval for information security policies.

C.

Several risk scenarios have action plans spanning multiple years.

D.

Senior management does not set risk tolerance.

Full Access
Question # 274

Which of the following is the MOST critical element to maximize the potential for a successful security implementation?

A.

The organization ' s knowledge

B.

Ease of implementation

C.

The organization ' s culture

D.

industry-leading security tools

Full Access
Question # 275

Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?

A.

Some IT risk scenarios have multi-year risk action plans.

B.

Several IT risk scenarios are missing assigned owners.

C.

Numerous IT risk scenarios have been granted risk acceptances.

D.

Many IT risk scenarios are categorized as avoided.

Full Access
Question # 276

An organization practices the principle of least privilege. To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:

A.

business purpose documentation and software license counts

B.

an access control matrix and approval from the user ' s manager

C.

documentation indicating the intended users of the application

D.

security logs to determine the cause of invalid login attempts

Full Access
Question # 277

Which of the following is MOST important to address for an organization looking to improve its IT asset management processes?

A.

Lack of predictive analytics for asset failures

B.

Lack of detailed historical asset data

C.

Lack of a centralized asset inventory

D.

Lack of asset valuation mechanisms

Full Access
Question # 278

Which of the following will BEST quantify the risk associated with malicious users in an organization?

A.

Business impact analysis

B.

Risk analysis

C.

Threat risk assessment

D.

Vulnerability assessment

Full Access
Question # 279

The risk associated with an asset before controls are applied can be expressed as:

A.

a function of the likelihood and impact

B.

the magnitude of an impact

C.

a function of the cost and effectiveness of control.

D.

the likelihood of a given threat

Full Access
Question # 280

Which of these documents is MOST important to request from a cloud service

provider during a vendor risk assessment?

A.

Nondisclosure agreement (NDA)

B.

Independent audit report

C.

Business impact analysis (BIA)

D.

Service level agreement (SLA)

Full Access
Question # 281

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

A.

Number of training sessions completed

B.

Percentage of staff members who complete the training with a passing score

C.

Percentage of attendees versus total staff

D.

Percentage of staff members who attend the training with positive feedback

Full Access
Question # 282

Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?

A.

Use production data in a non-production environment

B.

Use masked data in a non-production environment

C.

Use test data in a production environment

D.

Use anonymized data in a non-production environment

Full Access
Question # 283

Which of the following IT key risk indicators (KRIs) provides management with the BEST feedback on IT capacity?

A.

Trends in IT resource usage

B.

Trends in IT maintenance costs

C.

Increased resource availability

D.

Increased number of incidents

Full Access
Question # 284

Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?

A.

Re-evaluate current controls.

B.

Revise the current risk action plan.

C.

Escalate the risk to senior management.

D.

Implement additional controls.

Full Access
Question # 285

The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:

A.

develop a comprehensive risk mitigation strategy

B.

develop understandable and realistic risk scenarios

C.

identify root causes for relevant events

D.

perform an aggregated cost-benefit analysis

Full Access
Question # 286

When prioritizing risk response, management should FIRST:

A.

evaluate the organization s ability and expertise to implement the solution.

B.

evaluate the risk response of similar organizations.

C.

address high risk factors that have efficient and effective solutions.

D.

determine which risk factors have high remediation costs

Full Access
Question # 287

The PRIMARY reason for communicating risk assessment results to data owners is to enable the:

A.

design of appropriate controls.

B.

industry benchmarking of controls.

C.

prioritization of response efforts.

D.

classification of information assets.

Full Access
Question # 288

Whose risk tolerance matters MOST when making a risk decision?

A.

Customers who would be affected by a breach

B.

Auditors, regulators and standards organizations

C.

The business process owner of the exposed assets

D.

The information security manager

Full Access
Question # 289

An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?

A.

Enforce criminal background checks.

B.

Mask customer data fields.

C.

Require vendor to sign a confidentiality agreement.

D.

Restrict access to customer data on a " need to know ' ' basis.

Full Access
Question # 290

The PRIMARY objective of a risk identification process is to:

A.

evaluate how risk conditions are managed.

B.

determine threats and vulnerabilities.

C.

estimate anticipated financial impact of risk conditions.

D.

establish risk response options.

Full Access
Question # 291

An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?

A.

Identify systems that are vulnerable to being exploited by the attack.

B.

Confirm with the antivirus solution vendor whether the next update will detect the attack.

C.

Verify the data backup process and confirm which backups are the most recent ones available.

D.

Obtain approval for funding to purchase a cyber insurance plan.

Full Access
Question # 292

Which of the following is the MOST effective way to determine if a risk factor exceeds risk tolerance?

A.

Review the risk profile.

B.

Conduct a gap analysis.

C.

Monitor changes in external risk factors.

D.

Analyze key performance indicators (KPIs).

Full Access
Question # 293

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (IoT) devices installed in the production environment lack appropriate security controls for sensitive data?

A.

Recommend device management controls.

B.

Enable role-based access control (RBAC).

C.

Assess the threat and associated impact.

D.

Evaluate risk appetite and tolerance levels.

Full Access
Question # 294

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Full Access
Question # 295

What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?

A.

Source information is acquired at stable cost.

B.

Source information is tailored by removing outliers.

C.

Source information is readily quantifiable.

D.

Source information is consistently available.

Full Access
Question # 296

Which of the following is the BEST course of action to reduce risk impact?

A.

Create an IT security policy.

B.

Implement corrective measures.

C.

Implement detective controls.

D.

Leverage existing technology

Full Access
Question # 297

Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?

A.

Testing in a non-production environment

B.

Performing a security control review

C.

Reviewing the security audit report

D.

Conducting a risk assessment

Full Access
Question # 298

Which of the following is the MOST important reason to report on changes or trends related to an organization ' s IT risk profile?

A.

To benchmark against a risk management framework

B.

To predict external regulatory changes

C.

To adapt to emerging threats

D.

To reduce the cost of performing control activities

Full Access
Question # 299

Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?

A.

Internal and external information security incidents

B.

The risk department ' s roles and responsibilities

C.

Policy compliance requirements and exceptions process

D.

The organization ' s information security risk profile

Full Access
Question # 300

Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?

A.

Conducting security awareness training

B.

Updating the information security policy

C.

Implementing mock phishing exercises

D.

Requiring two-factor authentication

Full Access
Question # 301

Which of the following is the BEST reason to use qualitative measures to express residual risk levels related to emerging threats?

A.

Qualitative measures require less ongoing monitoring.

B.

Qualitative measures are better aligned to regulatory requirements.

C.

Qualitative measures are better able to incorporate expert judgment.

D.

Qualitative measures are easier to update.

Full Access
Question # 302

Which of the following should be considered FIRST when creating a comprehensive IT risk register?

A.

Risk management budget

B.

Risk mitigation policies

C.

Risk appetite

D.

Risk analysis techniques

Full Access
Question # 303

Which of the following should be a risk practitioner ' s NEXT step upon learning the impact of an organization ' s noncompliance with a specific legal regulation?

A.

Identify risk response options.

B.

Implement compensating controls.

C.

Invoke the incident response plan.

D.

Document the penalties for noncompliance.

Full Access
Question # 304

Which of the following is the MOST effective control to maintain the integrity of system configuration files?

A.

Recording changes to configuration files

B.

Implementing automated vulnerability scanning

C.

Restricting access to configuration documentation

D.

Monitoring against the configuration standard

Full Access
Question # 305

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

A.

Change logs

B.

Change management meeting minutes

C.

Key control indicators (KCIs)

D.

Key risk indicators (KRIs)

Full Access
Question # 306

Which of the following trends would cause the GREATEST concern regarding the effectiveness of an organization ' s user access control processes? An increase in the:

A.

ratio of disabled to active user accounts.

B.

percentage of users with multiple user accounts.

C.

average number of access entitlements per user account.

D.

average time between user transfers and access updates.

Full Access
Question # 307

From an IT risk perspective, which of the following has the GREATEST impact on organizational strategy?

A.

Complexity of IT architecture

B.

Changes in IT risk tolerance

C.

Complexity of recovery plans

D.

Methodology for IT risk identification

Full Access
Question # 308

An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:

A.

procedures to monitor the operation of controls.

B.

a tool for monitoring critical activities and controls.

C.

real-time monitoring of risk events and control exceptions.

D.

monitoring activities for all critical assets.

E.

Perform a controls assessment.

Full Access
Question # 309

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

A.

The volume of risk scenarios is too large

B.

Risk aggregation has not been completed

C.

Risk scenarios are not applicable

D.

The risk analysts for each scenario is incomplete

Full Access
Question # 310

Which of the following is the BEST metric to measure employee adherence to organizational security policies?

A.

Total number of security policy audit findings

B.

Total number of regulatory violations

C.

Total number of security policy exceptions

D.

Total number of opened phishing emails

Full Access
Question # 311

Which of the following is MOST important when determining risk appetite?

A.

Assessing regulatory requirements

B.

Benchmarking against industry standards

C.

Gaining management consensus

D.

Identifying risk tolerance

Full Access
Question # 312

Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?

A.

Identify the potential risk.

B.

Monitor employee usage.

C.

Assess the potential risk.

D.

Develop risk awareness training.

Full Access
Question # 313

Which of the following is the MOST important consideration when developing risk strategies?

A.

Organization ' s industry sector

B.

Long-term organizational goals

C.

Concerns of the business process owners

D.

History of risk events

Full Access
Question # 314

An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?

A.

Qualitative method

B.

Industry calibration method

C.

Threat-based method

D.

Quantitative method

Full Access
Question # 315

Which of the following is the MOST important information to cover in a business continuity awareness training program for all employees of the organization?

A.

Recovery time objectives (RTOs)

B.

Communication plan

C.

Critical asset inventory

D.

Separation of duties

Full Access
Question # 316

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

A.

Periodic user privileges review

B.

Log monitoring

C.

Periodic internal audits

D.

Segregation of duties

Full Access
Question # 317

A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?

A.

The audit had a broader scope than the CSA.

B.

The CSA was not sample-based.

C.

The CSA did not test control effectiveness.

D.

The CSA was compliance-based, while the audit was risk-based.

Full Access
Question # 318

Which of the following controls BEST enables an organization to ensure a complete and accurate IT asset inventory?

A.

Prohibiting the use of personal devices for business

B.

Performing network scanning for unknown devices

C.

Requesting an asset list from business owners

D.

Documenting asset configuration baselines

Full Access
Question # 319

What is the PRIMARY reason to periodically review key performance indicators (KPIs)?

A.

Ensure compliance.

B.

Identify trends.

C.

Promote a risk-aware culture.

D.

Optimize resources needed for controls

Full Access
Question # 320

Which of the following is the GREATEST benefit of involving business owners in risk scenario development?

A.

Business owners have the ability to effectively manage risk.

B.

Business owners have authority to approve control implementation.

C.

Business owners understand the residual risk of competitors.

D.

Business owners are able to assess the impact.

Full Access
Question # 321

An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?

A.

Data may be commingled with other tenants ' data.

B.

System downtime does not meet the organization ' s thresholds.

C.

The infrastructure will be managed by the public cloud administrator.

D.

The cloud provider is not independently certified.

Full Access
Question # 322

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

A.

risk appetite.

B.

security policies

C.

process maps.

D.

risk tolerance level

Full Access
Question # 323

After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to

A.

recommend a program that minimizes the concerns of that production system.

B.

inform the process owner of the concerns and propose measures to reduce them.

C.

inform the IT manager of the concerns and propose measures to reduce them.

D.

inform the development team of the concerns and together formulate risk reduction measures.

Full Access
Question # 324

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

A.

Data controllers

B.

Data processors

C.

Data custodians

D.

Data owners

Full Access
Question # 325

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

Full Access
Question # 326

A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?

A.

The organization ' s strategic risk management projects

B.

Senior management roles and responsibilities

C.

The organizations risk appetite and tolerance

D.

Senior management allocation of risk management resources

Full Access
Question # 327

Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?

A.

Detective control

B.

Deterrent control

C.

Preventive control

D.

Corrective control

Full Access
Question # 328

Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?

A.

Reviewing password change history

B.

Performing periodic access recertification

C.

Conducting social engineering exercises

D.

Reviewing the results of security awareness surveys

Full Access
Question # 329

One of an organization ' s key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner ' s BEST recommendation?

A.

Additional mitigating controls should be identified.

B.

The system should not be used until the application is changed

C.

The organization ' s IT risk appetite should be adjusted.

D.

The associated IT risk should be accepted by management.

Full Access
Question # 330

A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?

A.

Develop a risk action plan to address the findings.

B.

Evaluate the impact of the vulnerabilities to the business application.

C.

Escalate the findings to senior management and internal audit.

D.

Conduct a penetration test to validate the vulnerabilities from the findings.

Full Access
Question # 331

Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?

A.

Key risk indicators (KRls) are developed for key IT risk scenarios

B.

IT risk scenarios are assessed by the enterprise risk management team

C.

Risk appetites for IT risk scenarios are approved by key business stakeholders.

D.

IT risk scenarios are developed in the context of organizational objectives.

Full Access
Question # 332

Which of the following is MOST important to consider when determining risk appetite?

A.

Service level agreements (SLAs)

B.

Risk heat map

C.

IT capacity

D.

Risk culture

Full Access
Question # 333

Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?

A.

Lack of access verification for systems on the internal network

B.

Identification and authentication failures for users

C.

Poorly configured firewall rules introducing security breaches

D.

Ineffective load balancing on network devices

Full Access
Question # 334

Which of the following is the BEST method for determining an enterprise ' s current appetite for risk?

A.

Comparative analysis of peer companies

B.

Reviews of brokerage firm assessments

C.

Interviews with senior management

D.

Trend analysis using prior annual reports

Full Access
Question # 335

Senior management is deciding whether to share confidential data with the organization ' s business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

A.

possible risk and suggested mitigation plans.

B.

design of controls to encrypt the data to be shared.

C.

project plan for classification of the data.

D.

summary of data protection and privacy legislation.

Full Access
Question # 336

Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?

A.

To ensure enterprise-wide risk management

B.

To establish control ownership

C.

To enable a comprehensive view of risk

D.

To identify key risk indicators (KRIs)

Full Access
Question # 337

Which of the following is the BEST way to ensure ongoing control effectiveness?

A.

Establishing policies and procedures

B.

Periodically reviewing control design

C.

Measuring trends in control performance

D.

Obtaining management control attestations

Full Access
Question # 338

Which of the following activities is a responsibility of the second line of defense?

A.

Challenging risk decision making

B.

Developing controls to manage risk scenarios

C.

Implementing risk response plans

D.

Establishing organizational risk appetite

Full Access
Question # 339

The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:

A.

highlight trends of developing risk.

B.

ensure accurate and reliable monitoring.

C.

take appropriate actions in a timely manner.

D.

set different triggers for each stakeholder.

Full Access
Question # 340

An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?

A.

Authentication logs have been disabled.

B.

An external vulnerability scan has been detected.

C.

A brute force attack has been detected.

D.

An increase in support requests has been observed.

Full Access
Question # 341

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

A.

Identifying tweets that may compromise enterprise architecture (EA)

B.

Including diverse Business scenarios in user acceptance testing (UAT)

C.

Performing risk assessments during the business case development stage

D.

Including key stakeholders in review of user requirements

Full Access
Question # 342

An organization recently implemented a cybersecurity awareness program that includes phishing simul-ation exercises for all employees. What type of control is being utilized?

A.

Deterrent

B.

Preventive

C.

Compensating

D.

Detective

Full Access
Question # 343

Which of the following should be a risk practitioner ' s NEXT action after identifying a high probability of data loss in a system?

A.

Enhance the security awareness program.

B.

Increase the frequency of incident reporting.

C.

Purchase cyber insurance from a third party.

D.

Conduct a control assessment.

Full Access
Question # 344

Which of the following BEST enables an organization to determine whether risk management is aligned with its goals and objectives?

A.

The organization has approved policies that provide operational boundaries.

B.

Organizational controls are in place to effectively manage risk appetite.

C.

Environmental changes that impact risk are continually evaluated.

D.

The organization has an approved enterprise architecture (EA) program.

Full Access
Question # 345

Which of the following is the MOST appropriate role to determine risk appetite and tolerance?

A.

Senior management

B.

Internal auditor

C.

Risk owner

D.

Business process owner

Full Access
Question # 346

Which of the following is MOST important to promoting a risk-aware culture?

A.

Regular testing of risk controls

B.

Communication of audit findings

C.

Procedures for security monitoring

D.

Open communication of risk reporting

Full Access
Question # 347

Which of the following scenarios is MOST important to communicate to senior management?

A.

Accepted risk scenarios with detailed plans for monitoring

B.

Risk scenarios that have been shared with vendors and third parties

C.

Accepted risk scenarios with impact exceeding the risk tolerance

D.

Risk scenarios that have been identified, assessed, and responded to by the risk owners

Full Access
Question # 348

The following is the snapshot of a recently approved IT risk register maintained by an organization ' s information security department.

After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?

A.

Risk Impact Rating

B.

Risk Owner

C.

Risk Likelihood Rating

D.

Risk Exposure

Full Access
Question # 349

During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:

A.

reset the alert threshold based on peak traffic

B.

analyze the traffic to minimize the false negatives

C.

analyze the alerts to minimize the false positives

D.

sniff the traffic using a network analyzer

Full Access
Question # 350

Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?

A.

Risk register

B.

Risk appetite

C.

Risk dashboard

D.

Risk action plans

Full Access
Question # 351

Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?

A.

Individuals outside IT are managing action plans for the risk scenarios.

B.

Target dates for completion are missing from some action plans.

C.

Senior management approved multiple changes to several action plans.

D.

Many action plans were discontinued after senior management accepted the risk.

Full Access
Question # 352

Which of the following BEST supports the management of identified risk scenarios?

A.

Collecting risk event data

B.

Maintaining a risk register

C.

Using key risk indicators (KRIs)

D.

Defining risk parameters

Full Access
Question # 353

When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?

A.

Materiality

B.

Confidentiality

C.

Maturity

D.

Transparency

Full Access
Question # 354

Which of the following is the PRIMARY reason for a risk practitioner to examine a post-implementation review report for a control automation tool?

A.

To verify that budget for the project is managed effectively

B.

To confirm compliance with project management methodology

C.

To ensure the risk is managed to an acceptable level

D.

To ensure audit findings are addressed in a timely manner

Full Access
Question # 355

To enable effective risk governance, it is MOST important for senior management to:

A.

Ensure the IT governance framework is up to date.

B.

Communicate the risk management strategy across the organization.

C.

Gain a clear understanding of business risk and related ownership.

D.

Ensure security policies and procedures are documented.

Full Access
Question # 356

An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner ' s FIRST course of action?

A.

Determine whether the impact is outside the risk appetite.

B.

Request a formal acceptance of risk from senior management.

C.

Report the ineffective control for inclusion in the next audit report.

D.

Deploy a compensating control to address the identified deficiencies.

Full Access
Question # 357

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for

sensitive data?

A.

Assess the threat and associated impact.

B.

Evaluate risk appetite and tolerance levels

C.

Recommend device management controls

D.

Enable role-based access control.

Full Access
Question # 358

A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?

A.

Regulatory requirements may differ in each country.

B.

Data sampling may be impacted by various industry restrictions.

C.

Business advertising will need to be tailored by country.

D.

The data analysis may be ineffective in achieving objectives.

Full Access
Question # 359

Which of the following would offer the MOST insight with regard to an organization ' s risk culture?

A.

Risk management procedures

B.

Senior management interviews

C.

Benchmark analyses

D.

Risk management framework

Full Access
Question # 360

Which of the following should be management ' s PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?

A.

Designing compensating controls

B.

Determining if KRIs have been updated recently

C.

Assessing the effectiveness of the incident response plan

D.

Determining what has changed in the environment

Full Access
Question # 361

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan ' '

A.

To ensure completion of the risk assessment cycle

B.

To ensure controls arc operating effectively

C.

To ensure residual risk Is at an acceptable level

D.

To ensure control costs do not exceed benefits

Full Access
Question # 362

The PRIMARY basis for selecting a security control is:

A.

to achieve the desired level of maturity.

B.

the materiality of the risk.

C.

the ability to mitigate risk.

D.

the cost of the control.

Full Access
Question # 363

A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?

A.

Risk forecasting

B.

Risk tolerance

C.

Risk likelihood

D.

Risk appetite

Full Access
Question # 364

Which of the following key risk indicators (KRIs) provides the BEST insight into the risk associated with IT systems being unable to meet the required availability service level in the future?

A.

Percentage of IT systems having defined incident management service levels

B.

Percentage of IT systems having met the availability service level

C.

Percentage of IT outsourced systems having met the availability service level

D.

Percentage of IT systems routinely running at peak utilization

Full Access
Question # 365

Which of the following is MOST effective in continuous risk management process improvement?

A.

Periodic assessments

B.

Change management

C.

Awareness training

D.

Policy updates

Full Access
Question # 366

Which of the following is the GREATEST concern associated with redundant data in an organization ' s inventory system?

A.

Poor access control

B.

Unnecessary data storage usage

C.

Data inconsistency

D.

Unnecessary costs of program changes

Full Access
Question # 367

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

A.

Including trend analysis of risk metrics

B.

Using an aggregated view of organizational risk

C.

Relying on key risk indicator (KRI) data

D.

Ensuring relevance to organizational goals

Full Access
Question # 368

Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?

A.

The impact of controls on the efficiency of the business in delivering services

B.

Linkage of identified risk scenarios with enterprise risk management

C.

Potential threats and vulnerabilities that may have an impact on the business

D.

Results of network vulnerability scanning and penetration testing

Full Access
Question # 369

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.

B.

Implement a key performance indicator (KPI) to monitor the existing control performance.

C.

Accept the residual risk in its entirety and obtain executive management approval.

D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.

Full Access
Question # 370

Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?

A.

An annual contract review

B.

A service level agreement (SLA)

C.

A requirement to adopt an established risk management framework

D.

A requirement to provide an independent audit report

Full Access
Question # 371

An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?

A.

The third party ' s IT operations manager

B.

The organization ' s process owner

C.

The third party ' s chief risk officer (CRO)

D.

The organization ' s risk practitioner

Full Access
Question # 372

A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

A.

Business continuity manager

B.

Chief risk officer (CRO)

C.

IT infrastructure manager

D.

Business application owner

Full Access
Question # 373

Which strategy employed by risk management would BEST help to prevent internal fraud?

A.

Require control owners to conduct an annual control certification.

B.

Conduct regular internal and external audits on the systems supporting financial reporting.

C.

Ensure segregation of duties are implemented within key systems or processes.

D.

Require the information security officer to review unresolved incidents.

Full Access
Question # 374

A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?

A.

Training and awareness of employees for increased vigilance

B.

Increased monitoring of executive accounts

C.

Subscription to data breach monitoring sites

D.

Suspension and takedown of malicious domains or accounts

Full Access
Question # 375

Which of the following would be MOST helpful to a risk practitioner when preparing a summary of current IT risk for senior management review?

A.

Changes in risk mitigation plans

B.

Resolution status of audit findings

C.

Areas of elevated risk

D.

Industry risk management benchmarks

Full Access
Question # 376

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

A.

Identifying critical information assets

B.

Identifying events impacting continuity of operations.

C.

Creating a data classification scheme

D.

Analyzing previous risk assessment results

Full Access
Question # 377

An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:

A.

reduce the risk to an acceptable level.

B.

communicate the consequences for violations.

C.

implement industry best practices.

D.

reduce the organization ' s risk appetite

Full Access
Question # 378

Which of the following will BEST support management repotting on risk?

A.

Risk policy requirements

B.

A risk register

C.

Control self-assessment

D.

Key performance Indicators

Full Access
Question # 379

To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?

A.

Threshold definition

B.

Escalation procedures

C.

Automated data feed

D.

Controls monitoring

Full Access
Question # 380

A risk practitioner ' s BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:

A.

based on industry trends.

B.

mapped to incident response plans.

C.

related to probable events.

D.

aligned with risk management capabilities.

Full Access
Question # 381

Which of the following resources is MOST helpful to a risk practitioner when updating the likelihood rating in the risk register?

A.

Risk control assessment

B.

Audit reports with risk ratings

C.

Penetration test results

D.

Business impact analysis (BIA)

Full Access
Question # 382

Which of the following is the PRIMARY reason to perform ongoing risk assessments?

A.

Emerging risk must be continuously reported to management.

B.

New system vulnerabilities emerge at frequent intervals.

C.

The risk environment is subject to change.

D.

The information security budget must be justified.

Full Access
Question # 383

Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?

A.

Industry trends in Al

B.

Expected algorithm outputs

C.

Data feeds

D.

Alert functionality

Full Access
Question # 384

A maturity model will BEST indicate:

A.

confidentiality and integrity.

B.

effectiveness and efficiency.

C.

availability and reliability.

D.

certification and accreditation.

Full Access
Question # 385

Which of the following provides the BEST assurance of the effectiveness of vendor security controls?

A.

Review vendor control self-assessments (CSA).

B.

Review vendor service level agreement (SLA) metrics.

C.

Require independent control assessments.

D.

Obtain vendor references from existing customers.

Full Access
Question # 386

Which of the following provides the BEST protection for Internet of Things (loT) devices that are accessed within an organization?

A.

Identity and access management (IAM)

B.

Comprehensive patching program

C.

Source code reviews

D.

Adoption of a defense-in-depth strategy

Full Access
Question # 387

Which organizational role should be accountable for ensuring information assets are appropriately classified?

A.

Data protection officer

B.

Chief information officer (CIO)

C.

Information asset custodian

D.

Information asset owner

Full Access
Question # 388

Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?

A.

Cost of implementation

B.

Implementation of unproven applications

C.

Disruption to business processes

D.

Increase in attack surface area

Full Access
Question # 389

What should a risk practitioner do FIRST when an assessment reveals a control is not operating as intended?

A.

Recommend updates to the control procedures

B.

Determine the root cause of the control issue.

C.

Discuss the status with the control owner.

D.

Recommend compensating controls.

Full Access
Question # 390

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

A.

To support regulatory requirements

B.

To prevent the risk scenario in the current environment

C.

To monitor for potential changes to the risk scenario

D.

To track historical risk assessment results

Full Access
Question # 391

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

A.

Segregation of duties

B.

Three lines of defense

C.

Compliance review

D.

Quality assurance review

Full Access
Question # 392

In order to determining a risk is under-controlled the risk practitioner will need to

A.

understand the risk tolerance

B.

monitor and evaluate IT performance

C.

identify risk management best practices

D.

determine the sufficiency of the IT risk budget

Full Access
Question # 393

A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?

A.

Determine whether risk responses are still adequate.

B.

Analyze and update control assessments with the new processes.

C.

Analyze the risk and update the risk register as needed.

D.

Conduct testing of the control that mitigate the existing risk.

Full Access
Question # 394

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response '

A.

Identify the regulatory bodies that may highlight this gap

B.

Highlight news articles about data breaches

C.

Evaluate the risk as a measure of probable loss

D.

Verify if competitors comply with a similar policy

Full Access
Question # 395

Which of the following would MOST likely require a risk practitioner to update the risk register?

A.

An alert being reported by the security operations center.

B.

Development of a project schedule for implementing a risk response

C.

Completion of a project for implementing a new control

D.

Engagement of a third party to conduct a vulnerability scan

Full Access
Question # 396

Which of the following is the BEST source for identifying key control indicators (KCIs)?

A.

Privileged user activity monitoring controls

B.

Controls mapped to organizational risk scenarios

C.

Recent audit findings of control weaknesses

D.

A list of critical security processes

Full Access
Question # 397

Which of the following is the PRIMARY objective for automating controls?

A.

Reducing the need for audit reviews

B.

Facilitating continuous control monitoring

C.

Improving control process efficiency

D.

Complying with functional requirements

Full Access
Question # 398

An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?

A.

Inherent risk

B.

Risk appetite

C.

Risk tolerance

D.

Residual risk

Full Access
Question # 399

Which of the following is the MOST important key risk indicator (KRI) to protect personal information on corporate mobile endpoints?

A.

Percentage of endpoints that are not encrypted

B.

Number of endpoints not compliant with patching policy

C.

Ratio of undiscoverable endpoints to encrypted endpoints

D.

Percentage of endpoints with outdated antivirus signatures

Full Access
Question # 400

A risk practitioner notices that a particular key risk indicator (KRI) has remained below its established trigger point for an extended period of time. Which of the following should be done FIRST?

A.

Recommend a re-evaluation of the current threshold of the KRI.

B.

Notify management that KRIs are being effectively managed.

C.

Update the risk rating associated with the KRI In the risk register.

D.

Update the risk tolerance and risk appetite to better align to the KRI.

Full Access
Question # 401

From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?

A.

Updates align with strategic business objectives.

B.

Updates will be approved by the risk owners.

C.

Updates align with industry standards and benchmarks.

D.

Updates will be reviewed periodically to ensure compliance.

Full Access
Question # 402

A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:

A.

mature

B.

ineffective.

C.

optimized.

D.

inefficient.

Full Access
Question # 403

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?

A.

Postpone the risk assessment.

B.

Facilitate the exception process.

C.

Accept the manager ' s request.

D.

Reject the manager ' s request.

Full Access
Question # 404

Which of the following should be the PRIMARY consideration for a startup organization that has decided to adopt externally-sourced security policies?

A.

Availability of policy updates and support

B.

Stakeholder buy-in of policies

C.

Applicability to business operations

D.

Compliance with local regulations

Full Access
Question # 405

The MOST effective way to increase the likelihood that risk responses will be implemented is to:

A.

create an action plan

B.

assign ownership

C.

review progress reports

D.

perform regular audits.

Full Access
Question # 406

Which of the following activities is MOST likely to be assigned to the second line in the three lines model?

A.

Validating whether IT risk control systems are operational

B.

Monitoring IT security policy compliance

C.

Calculating phishing attack key risk indicators (KRIs)

D.

Appropriately configuring the web application firewall (WAF)

Full Access
Question # 407

As part of an overall IT risk management plan, an IT risk register BEST helps management:

A.

align IT processes with business objectives.

B.

communicate the enterprise risk management policy.

C.

stay current with existing control status.

D.

understand the organizational risk profile.

Full Access
Question # 408

Which of the following is the BEST indication that key risk indicators (KRls) should be revised?

A.

A decrease in the number of critical assets covered by risk thresholds

B.

An Increase In the number of risk threshold exceptions

C.

An increase in the number of change events pending management review

D.

A decrease In the number of key performance indicators (KPls)

Full Access
Question # 409

Which of the following BEST indicates the effectiveness of anti-malware software?

A.

Number of staff hours lost due to malware attacks

B.

Number of downtime hours in business critical servers

C.

Number of patches made to anti-malware software

D.

Number of successful attacks by malicious software

Full Access
Question # 410

Which of the following is the BEST risk management approach for the strategic IT planning process?

A.

Key performance indicators (KPIs) are established to track IT strategic initiatives.

B.

The IT strategic plan is reviewed by the chief information security officer (CISO) and enterprise risk management (ERM).

C.

The IT strategic plan is developed from the organization-wide risk management plan.

D.

Risk scenarios associated with IT strategic initiatives are identified and assessed.

Full Access
Question # 411

Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?

A.

Digital signatures

B.

Encrypted passwords

C.

One-time passwords

D.

Digital certificates

Full Access
Question # 412

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Full Access
Question # 413

An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?

A.

The controls may not be properly tested

B.

The vendor will not ensure against control failure

C.

The vendor will not achieve best practices

D.

Lack of a risk-based approach to access control

Full Access
Question # 414

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

A.

Limited blockchain adoption and support

B.

Reduced transaction speed and system responsiveness

C.

Reduced network integrity and availability

D.

Limited integration with external systems and blockchains

Full Access
Question # 415

The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?

A.

Escalate to senior management

B.

Require a nondisclosure agreement.

C.

Sanitize portions of the register

D.

Determine the purpose of the request

Full Access
Question # 416

To define the risk management strategy which of the following MUST be set by the board of directors?

A.

Operational strategies

B.

Risk governance

C.

Annualized loss expectancy (ALE)

D.

Risk appetite

Full Access
Question # 417

Which of the following provides the BEST evidence of the effectiveness of an organization ' s account provisioning process?

A.

User provisioning

B.

Role-based access controls

C.

Security log monitoring

D.

Entitlement reviews

Full Access
Question # 418

Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?

A.

Providing oversight of risk management processes

B.

Implementing processes to detect and deter fraud

C.

Ensuring that risk and control assessments consider fraud

D.

Monitoring the results of actions taken to mitigate fraud

Full Access
Question # 419

Which of the following is MOST helpful to understand the consequences of an IT risk event?

A.

Fault tree analysis

B.

Historical trend analysis

C.

Root cause analysis

D.

Business impact analysis (BIA)

Full Access
Question # 420

Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?

A.

Standards-based policies

B.

Audit readiness

C.

Efficient operations

D.

Regulatory compliance

Full Access
Question # 421

Which of the following presents the GREATEST challenge to managing an organization ' s end-user devices?

A.

Incomplete end-user device inventory

B.

Unsupported end-user applications

C.

Incompatible end-user devices

D.

Multiple end-user device models

Full Access
Question # 422

Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?

A.

internal audit recommendations

B.

Laws and regulations

C.

Policies and procedures

D.

Standards and frameworks

Full Access
Question # 423

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

A.

Risk appetite statement

B.

Enterprise risk management framework

C.

Risk management policies

D.

Risk register

Full Access
Question # 424

Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s software testing program?

A.

Average time to complete software test cases

B.

Percentage of applications with defined business cases

C.

Number of incidents resulting from software changes

D.

Percentage of staff completing software development training

Full Access
Question # 425

Which of the following is the MOST important reason to revisit a previously accepted risk?

A.

To update risk ownership

B.

To review the risk acceptance with new stakeholders

C.

To ensure risk levels have not changed

D.

To ensure controls are still operating effectively

Full Access
Question # 426

An IT risk practitioner has been tasked to engage key stakeholders to assess risk for key IT risk scenarios. Which of the following is the PRIMARY benefit of this activity?

A.

Establishing the available risk mitigation budget

B.

Verifying the relevance of risk ratings

C.

Demonstrating compliance to regulatory bodies

D.

Assessing IT risk management culture

Full Access
Question # 427

What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?

A.

Mitigation and control value

B.

Volume and scope of data generated daily

C.

Business criticality and sensitivity

D.

Recovery point objective (RPO) and recovery time objective (RTO)

Full Access
Question # 428

An unauthorized individual has socially engineered entry into an organization ' s secured physical premises. Which of the following is the BEST way to prevent future occurrences?

A.

Employ security guards.

B.

Conduct security awareness training.

C.

Install security cameras.

D.

Require security access badges.

Full Access
Question # 429

Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?

A.

Requiring a printer access code for each user

B.

Using physical controls to access the printer room

C.

Using video surveillance in the printer room

D.

Ensuring printer parameters are properly configured

Full Access
Question # 430

Which of the following is MOST important to add to the risk register for a remediated risk scenario?

A.

Notification to technical teams of implementation schedules

B.

Sign-off by senior executives

C.

Evidence of successfully implemented controls

D.

Minutes from control design meetings

Full Access
Question # 431

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

A.

Management approval

B.

Annual review

C.

Relevance

D.

Automation

Full Access
Question # 432

In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?

A.

Potential benefits from use of Al solutions

B.

Monitoring techniques required for AI solutions

C.

Changes to existing infrastructure to support Al solutions

D.

Skills required to support Al solutions

Full Access
Question # 433

While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:

A.

review and update the policies to align with industry standards.

B.

determine that the policies should be updated annually.

C.

report that the policies are adequate and do not need to be updated frequently.

D.

review the policies against current needs to determine adequacy.

Full Access
Question # 434

Which of the following should be the HIGHEST priority when developing a risk response?

A.

The risk response addresses the risk with a holistic view.

B.

The risk response is based on a cost-benefit analysis.

C.

The risk response is accounted for in the budget.

D.

The risk response aligns with the organization ' s risk appetite.

Full Access
Question # 435

Which of the following should be the PRIMARY recipient of reports showing the

progress of a current IT risk mitigation project?

A.

Senior management

B.

Project manager

C.

Project sponsor

D.

IT risk manager

Full Access
Question # 436

A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?

A.

A post-implementation review has been conducted by key personnel.

B.

A qualified independent party assessed the new controls as effective.

C.

Senior management has signed off on the design of the controls.

D.

Robots have operated without human interference on a daily basis.

Full Access
Question # 437

Which of the following activities should only be performed by the third line of defense?

A.

Operating controls for risk mitigation

B.

Testing the effectiveness and efficiency of internal controls

C.

Providing assurance on risk management processes

D.

Recommending risk treatment options

Full Access
Question # 438

When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?

A.

Risk management strategy planning

B.

Risk monitoring and control

C.

Risk identification

D.

Risk response planning

Full Access
Question # 439

A risk practitioner has identified that the organization ' s secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?

A.

Business continuity director

B.

Disaster recovery manager

C.

Business application owner

D.

Data center manager

Full Access
Question # 440

Which of the following should be the PRIMARY consideration when prioritizing limited resources needed to implement overdue corrective actions arising from a recent internal audit?

A.

Level of risk impact

B.

Cost-benefit analysis

C.

Key control indicator (KCI) measures

D.

Availability of other technical controls

Full Access
Question # 441

Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:

A.

a process for measuring and reporting control performance.

B.

an alternate control design in case of failure of the identified control.

C.

a process for bypassing control procedures in case of exceptions.

D.

procedures to ensure the effectiveness of the control.

Full Access
Question # 442

Which of the following should be the FIRST consideration when establishing a new risk governance program?

A.

Developing an ongoing awareness and training program

B.

Creating policies and standards that are easy to comprehend

C.

Embedding risk management into the organization

D.

Completing annual risk assessments on critical resources

Full Access
Question # 443

To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority ' ?

A.

Local authorities and regulators

B.

Ethics and compliance team

C.

Senior management

D.

Internal audit team

Full Access
Question # 444

Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?

A.

Cost and benefit

B.

Security and availability

C.

Maintainability and reliability

D.

Performance and productivity

Full Access
Question # 445

When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?

A.

Risk management

B.

Change management

C.

Problem management

D.

Quality management

Full Access
Question # 446

An organization is developing a risk awareness program for contractors and consultants. Which of the following is MOST important for the organization to keep confidential?

A.

Key risk indicator (KRI) threshold methodology

B.

Names of key cloud providers

C.

Unmitigated vulnerabilities

D.

Corporate security policies

Full Access
Question # 447

Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?

A.

Background checks

B.

Awareness training

C.

User access

D.

Policy management

Full Access
Question # 448

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 449

The PRIMARY goal of a risk management program is to:

A.

facilitate resource availability.

B.

help ensure objectives are met.

C.

safeguard corporate assets.

D.

help prevent operational losses.

Full Access
Question # 450

Which of the following is MOST important to ensure when reviewing an organization ' s risk register?

A.

Risk ownership is recorded.

B.

Vulnerabilities have separate entries.

C.

Control ownership is recorded.

D.

Residual risk is less than inherent risk.

Full Access
Question # 451

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

A.

Percentage of business users completing risk training

B.

Percentage of high-risk scenarios for which risk action plans have been developed

C.

Number of key risk indicators (KRIs) defined

D.

Time between when IT risk scenarios are identified and the enterprise ' s response

Full Access
Question # 452

When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?

A.

BCP testing is net in conjunction with the disaster recovery plan (DRP)

B.

Recovery time objectives (RTOs) do not meet business requirements.

C.

BCP is often tested using the walk-through method.

D.

Each business location has separate, inconsistent BCPs.

Full Access
Question # 453

After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner ' s BEST recommendation?

A.

Accept the risk with management sign-off.

B.

Ignore the risk until the regulatory body conducts a compliance check.

C.

Mitigate the risk with the identified control.

D.

Transfer the risk by buying insurance.

Full Access
Question # 454

Which of the following presents the GREATEST security risk associated with Internet of Things (IoT) technology?

A.

The inability to monitor via network management solutions

B.

The lack of relevant IoT security frameworks to guide the risk assessment process

C.

The heightened level of IoT threats via the widespread use of smart devices

D.

The lack of updates for vulnerable firmware

Full Access
Question # 455

An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner ' s BEST course of action?

A.

Reassess whether mitigating controls address the known risk in the processes.

B.

Update processes to address the new technology.

C.

Update the data governance policy to address the new technology.

D.

Perform a gap analysis of the impacted processes.

Full Access
Question # 456

Which of the following is MOST important when developing risk scenarios?

A.

Reviewing business impact analysis (BIA)

B.

Collaborating with IT audit

C.

Conducting vulnerability assessments

D.

Obtaining input from key stakeholders

Full Access
Question # 457

In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:

A.

system architecture in target areas.

B.

IT management policies and procedures.

C.

business objectives of the organization.

D.

defined roles and responsibilities.

Full Access
Question # 458

Which of the following will BEST ensure that controls adequately support business goals and objectives?

A.

Using the risk management process

B.

Enforcing strict disciplinary procedures in case of noncompliance

C.

Reviewing results of the annual company external audit

D.

Adopting internationally accepted controls

Full Access
Question # 459

An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?

A.

Risk manager

B.

Data owner

C.

End user

D.

IT department

Full Access
Question # 460

Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?

A.

Defining expectations in the enterprise risk policy

B.

Increasing organizational resources to mitigate risks

C.

Communicating external audit results

D.

Avoiding risks that could materialize into substantial losses

Full Access
Question # 461

After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;

A.

prepare an IT risk mitigation strategy.

B.

escalate to senior management.

C.

perform a cost-benefit analysis.

D.

review the impact to the IT environment.

Full Access
Question # 462

An organization has established workflows in its service desk to support employee reports of security-related concerns. Which of the following is the MOST efficient approach to analyze these concerns?

A.

Map concerns to organizational assets.

B.

Sort concerns by likelihood.

C.

Align concerns to key vendors.

D.

Prioritize concerns based on frequency of reports.

Full Access
Question # 463

In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner ' s BEST recommendation to further reduce the impact of ransomware attacks would be to implement:

A.

two-factor authentication.

B.

continuous data backup controls.

C.

encryption for data at rest.

D.

encryption for data in motion.

Full Access
Question # 464

Which of the following is the BEST response when a potential IT control deficiency has been identified?

A.

Remediate and report the deficiency to the enterprise risk committee.

B.

Verify the deficiency and then notify the business process owner.

C.

Verify the deficiency and then notify internal audit.

D.

Remediate and report the deficiency to senior executive management.

Full Access
Question # 465

The risk to an organization ' s reputation due to a recent cybersecurity breach is PRIMARILY considered to be:

A.

financial risk.

B.

data risk.

C.

operational risk.

D.

strategic risk.

Full Access
Question # 466

The MOST important consideration when selecting a control to mitigate an identified risk is whether:

A.

the cost of control exceeds the mitigation value

B.

there are sufficient internal resources to implement the control

C.

the mitigation measures create compounding effects

D.

the control eliminates the risk

Full Access
Question # 467

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

A.

Balanced scorecard

B.

Capability maturity level

C.

Internal audit plan

D.

Control self-assessment (CSA)

Full Access
Question # 468

A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?

A.

Assessing the degree to which the control hinders business objectives

B.

Reviewing the IT policy with the risk owner

C.

Reviewing the roles and responsibilities of control process owners

D.

Assessing noncompliance with control best practices

Full Access
Question # 469

An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner ' s BEST course of action?

A.

Perform an impact assessment.

B.

Perform a penetration test.

C.

Request an external audit.

D.

Escalate the risk to senior management.

Full Access
Question # 470

A recent regulatory requirement has the potential to affect an organization’s use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

A.

Conduct a gap analysis

B.

Transfer risk to the third party

C.

Terminate the outsourcing agreement

D.

Identify compensating controls

Full Access
Question # 471

A risk practitioner is asked to present the results of the most recent technology risk assessment to executive management in a concise manner. Which of the following is MOST important to include in the presentation?

A.

Residual risk levels

B.

Compensating controls

C.

Details of vulnerabilities

D.

Failed high-risk controls

Full Access
Question # 472

Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?

A.

Quantitative analysis might not be possible.

B.

Risk factors might not be relevant to the organization

C.

Implementation costs might increase.

D.

Inherent risk might not be considered.

Full Access
Question # 473

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Full Access
Question # 474

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

A.

Risk tolerance

B.

Risk appetite

C.

Risk awareness

D.

Risk policy

Full Access
Question # 475

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

A.

Creating a data classification scheme

B.

Identifying events impacting continuity of operations

C.

Analyzing previous risk assessment results

D.

Identifying critical information assets

Full Access
Question # 476

Which of the following is MOST useful when performing a quantitative risk assessment?

A.

RACI matrix

B.

Financial models

C.

Management support

D.

Industry benchmarking

Full Access
Question # 477

A risk practitioner finds that data has been misclassified. Which of the following is the GREATEST concern?

A.

Unauthorized access

B.

Data corruption

C.

Inadequate retention schedules

D.

Data disruption

Full Access
Question # 478

Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?

A.

A companion of risk assessment results to the desired state

B.

A quantitative presentation of risk assessment results

C.

An assessment of organizational maturity levels and readiness

D.

A qualitative presentation of risk assessment results

Full Access
Question # 479

A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?

A.

Enable data encryption in the test environment

B.

Implement equivalent security in the test environment.

C.

Prevent the use of production data for test purposes

D.

Mask data before being transferred to the test environment.

Full Access
Question # 480

The PRIMARY reason for prioritizing risk scenarios is to:

A.

provide an enterprise-wide view of risk

B.

support risk response tracking

C.

assign risk ownership

D.

facilitate risk response decisions.

Full Access
Question # 481

Optimized risk management is achieved when risk is reduced:

A.

with strategic initiatives.

B.

to meet risk appetite.

C.

within resource availability.

D.

below risk appetite.

Full Access
Question # 482

Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Creating metrics to track remote connections

B.

Updating the organizational policy for remote access

C.

Updating remote desktop software

D.

Implementing multi-factor authentication

Full Access
Question # 483

Which of the following should an organization perform to forecast the effects of a disaster?

A.

Develop a business impact analysis (BIA).

B.

Define recovery time objectives (RTO).

C.

Analyze capability maturity model gaps.

D.

Simulate a disaster recovery.

Full Access
Question # 484

The PRIMARY purpose of using a framework for risk analysis is to:

A.

improve accountability

B.

improve consistency

C.

help define risk tolerance

D.

help develop risk scenarios.

Full Access
Question # 485

When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?

A.

Risk action plans and associated owners

B.

Recent audit and self-assessment results

C.

Potential losses compared to treatment cost

D.

A list of assets exposed to the highest risk

Full Access
Question # 486

What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?

A.

Seek approval from the control owner.

B.

Update the action plan in the risk register.

C.

Reassess the risk level associated with the new control.

D.

Validate that the control has an established testing method.

Full Access
Question # 487

Which of the following BEST helps to mitigate risk associated with users inputting incorrect data into a system?

A.

Sequence check

B.

Tool tips

C.

User training

D.

Allowed values

Full Access
Question # 488

Which of the following should be an element of the risk appetite of an organization?

A.

The effectiveness of compensating controls

B.

The enterprise ' s capacity to absorb loss

C.

The residual risk affected by preventive controls

D.

The amount of inherent risk considered appropriate

Full Access
Question # 489

Which of the following BEST supports an accurate asset inventory system?

A.

Asset management metrics are aligned to industry benchmarks

B.

Organizational information risk controls are continuously monitored

C.

There are defined processes in place for onboarding assets

D.

The asset management team is involved in the budgetary planning process

Full Access
Question # 490

Which of the following is the BEST indication that an organization ' s risk management program has not reached the desired maturity level?

A.

Significant increases in risk mitigation budgets

B.

Large fluctuations in risk ratings between assessments

C.

A steady increase in the time to recover from incidents

D.

A large number of control exceptions

Full Access
Question # 491

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

A.

Implementing risk treatment plans

B.

Validating the status of risk mitigation efforts

C.

Establishing risk policies and standards

D.

Conducting independent reviews of risk assessment results

Full Access
Question # 492

Which of the following would be MOST useful to senior management when determining an appropriate risk response?

A.

A comparison of current risk levels with established tolerance

B.

A comparison of cost variance with defined response strategies

C.

A comparison of current risk levels with estimated inherent risk levels

D.

A comparison of accepted risk scenarios associated with regulatory compliance

Full Access
Question # 493

The MOST essential content to include in an IT risk awareness program is how to:

A.

populate risk register entries and build a risk profile for management reporting.

B.

prioritize IT-related actions by considering risk appetite and risk tolerance.

C.

define the IT risk framework for the organization.

D.

comply with the organization ' s IT risk and information security policies.

Full Access
Question # 494

Which of the following is the BEST metric to demonstrate the effectiveness of an organization ' s patch management process?

A.

Average time to implement patches after vendor release

B.

Number of patches tested prior to deployment

C.

Increase in the frequency of patches deployed into production

D.

Percent of patches implemented within established timeframe

Full Access
Question # 495

Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?

A.

Improving risk awareness

B.

Obtaining buy-in from risk owners

C.

Leveraging existing metrics

D.

Optimizing risk treatment decisions

Full Access
Question # 496

Which of the following BEST indicates the effective implementation of a risk treatment plan?

A.

Inherent risk is managed within an acceptable level.

B.

Residual risk is managed within appetite and tolerance.

C.

Risk treatments are aligned with industry peers.

D.

Key controls are identified and documented.

Full Access
Question # 497

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Implementing a data toss prevention (DLP) solution

B.

Assigning a data owner

C.

Scheduling periodic audits

D.

Implementing technical controls over the assets

Full Access
Question # 498

An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:

A.

senior management has oversight of the process.

B.

process ownership aligns with IT system ownership.

C.

segregation of duties exists between risk and process owners.

D.

risk owners have decision-making authority.

Full Access
Question # 499

Who should be accountable for monitoring the control environment to ensure controls are effective?

A.

Risk owner

B.

Security monitoring operations

C.

Impacted data owner

D.

System owner

Full Access
Question # 500

Which of the following is the PRIMARY purpose of a risk register?

A.

To assign control ownership of risk

B.

To provide a centralized view of risk

C.

To identify opportunities to transfer risk

D.

To mitigate organizational risk

Full Access
Question # 501

Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:

A.

trending data is available.

B.

process flowcharts are current.

C.

measurement objectives are defined.

D.

data collection technology is available.

Full Access
Question # 502

It was discovered that a service provider ' s administrator was accessing sensitive information without the approval of the customer in an Infrastructure as a Service (laaS) model. Which of the following would BEST protect against a future recurrence?

A.

Data encryption

B.

Intrusion prevention system (IPS)

C.

Two-factor authentication

D.

Contractual requirements

Full Access
Question # 503

Which of the following is the PRIMARY role of the first line of defense with respect to information security policies?

A.

Draft the information security policy.

B.

Approve the information security policy.

C.

Audit the implementation of the information security policy.

D.

Implement controls in response to the policy requirements.

Full Access
Question # 504

Which of the following BEST reduces the risk associated with the theft of a laptop containing sensitive information?

A.

Cable lock

B.

Data encryption

C.

Periodic backup

D.

Biometrics access control

Full Access
Question # 505

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

A.

Weak governance structures

B.

Senior management scrutiny

C.

Complex regulatory environment

D.

Unclear reporting relationships

Full Access
Question # 506

An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?

A.

Nondisclosure agreements (NDAs)

B.

Data anonymization

C.

Data cleansing

D.

Data encryption

Full Access
Question # 507

Which of the following is the MOST important element of a successful risk awareness training program?

A.

Customizing content for the audience

B.

Providing incentives to participants

C.

Mapping to a recognized standard

D.

Providing metrics for measurement

Full Access
Question # 508

The MAIN purpose of selecting a risk response is to.

A.

ensure compliance with local regulatory requirements

B.

demonstrate the effectiveness of risk management practices.

C.

ensure organizational awareness of the risk level

D.

mitigate the residual risk to be within tolerance

Full Access
Question # 509

Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?

A.

Aligning IT with short-term and long-term goals of the organization

B.

Ensuring the IT budget and resources focus on risk management

C.

Ensuring senior management ' s primary focus is on the impact of identified risk

D.

Prioritizing internal departments that provide service to customers

Full Access
Question # 510

Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?

A.

The organization may not have a sufficient number of skilled resources.

B.

Application and data migration cost for backups may exceed budget.

C.

Data may not be recoverable due to system failures.

D.

The database system may not be scalable in the future.

Full Access
Question # 511

Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?

A.

Risk mitigation budget

B.

Business Impact analysis

C.

Cost-benefit analysis

D.

Return on investment

Full Access
Question # 512

Which of the following BEST indicates whether security awareness training is effective?

A.

User self-assessment

B.

User behavior after training

C.

Course evaluation

D.

Quality of training materials

Full Access
Question # 513

An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner ' s BEST recommendation after recovery steps have been completed?

A.

Develop new key risk indicators (KRIs).

B.

Perform a root cause analysis.

C.

Recommend the purchase of cyber insurance.

D.

Review the incident response plan.

Full Access
Question # 514

What are the MOST essential attributes of an effective Key control indicator (KCI)?

A.

Flexibility and adaptability

B.

Measurability and consistency

C.

Robustness and resilience

D.

Optimal cost and benefit

Full Access
Question # 515

Which of the following is the BEST indication of an enhanced risk-aware culture?

A.

Users have read and agreed to comply with security policies.

B.

Risk issues are openly discussed within the organization.

C.

Scores have improved on risk awareness quizzes.

D.

There is a decrease in the number of reported incidents.

Full Access
Question # 516

As part of an aggressive new marketing strategy, an organization has decided to implement an emerging technology in a critical business system. Which of the following is the BEST course of action to address the risk associated with this new technology?

A.

Update the risk tolerance and appetite

B.

Identify technical solutions

C.

Obtain senior management support

D.

Re-evaluate the risk and existing controls

Full Access
Question # 517

Which of the following BEST indicates that an organization ' s risk management processes are mature?

A.

Risk policy is approved and communicated by the risk manager

B.

Annual risk awareness training is conducted by risk owners

C.

Risk principles are embedded within business operations and decisions

D.

The board regularly follows up on risk status and action plans

Full Access
Question # 518

Which of the following would BEST help to ensure that suspicious network activity is identified?

A.

Analyzing intrusion detection system (IDS) logs

B.

Analyzing server logs

C.

Using a third-party monitoring provider

D.

Coordinating events with appropriate agencies

Full Access
Question # 519

Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?

A.

Adopting qualitative enterprise risk assessment methods

B.

Linking IT risk scenarios to technology objectives

C.

linking IT risk scenarios to enterprise strategy

D.

Adopting quantitative enterprise risk assessment methods

Full Access
Question # 520

When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:

A.

Assess generic risk scenarios with business users.

B.

Validate the generic risk scenarios for relevance.

C.

Select the maximum possible risk scenarios from the list.

D.

Identify common threats causing generic risk scenarios

Full Access
Question # 521

Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?

A.

A control self-assessment

B.

A third-party security assessment report

C.

Internal audit reports from the vendor

D.

Service level agreement monitoring

Full Access
Question # 522

Which of the following should management consider when selecting a risk mitigation option?

A.

Maturity of the enterprise architecture

B.

Cost of control implementation

C.

Reliability of key performance indicators (KPIs)

D.

Reliability of key risk indicators (KPIs)

Full Access
Question # 523

What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?

A.

Determining possible losses due to downtime during the changes

B.

Updating control procedures and documentation

C.

Approving the proposed changes based on impact analysis

D.

Notifying owners of affected systems after the changes are implemented

Full Access
Question # 524

An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?

A.

The organization ' s business process owner

B.

The organization ' s information security manager

C.

The organization ' s vendor management officer

D.

The vendor ' s risk manager

Full Access
Question # 525

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?

A.

Percentage of job failures identified and resolved during the recovery process

B.

Percentage of processes recovered within the recovery time and point objectives

C.

Number of current test plans and procedures

D.

Number of issues and action items resolved during the recovery test

Full Access
Question # 526

An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?

A.

Reduced ability to evaluate key risk indicators (KRIs)

B.

Reduced access to internal audit reports

C.

Dependency on the vendor ' s key performance indicators (KPIs)

D.

Dependency on service level agreements (SLAs)

Full Access
Question # 527

Which of the following is BEST measured by key control indicators (KCIs)?

A.

Historical trends of the organizational risk profile

B.

Cost efficiency of risk treatment plan projects

C.

Comprehensiveness of risk assessment procedures

D.

Effectiveness of organizational defense in depth

Full Access
Question # 528

Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?

A.

Informed consent

B.

Cross border controls

C.

Business impact analysis (BIA)

D.

Data breach protection

Full Access
Question # 529

Risk appetite should be PRIMARILY driven by which of the following?

A.

Enterprise security architecture roadmap

B.

Stakeholder requirements

C.

Legal and regulatory requirements

D.

Business impact analysis (BIA)

Full Access
Question # 530

Which of the following would be MOST effective in monitoring changes in an organization ' s IT risk environment?

A.

Lagging indicators

B.

Risk mitigation plans

C.

Industry regulatory reports

D.

Risk inventory

Full Access
Question # 531

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

A.

ensuring controls are operating efficiently and facilitating productivity.

B.

enabling senior leadership to better understand the level of risk the organization is facing.

C.

monitoring changes in the likelihood of adverse events due to ineffective controls.

D.

providing information on the degree to which controls are meeting intended objectives.

Full Access
Question # 532

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to " owing would provide the MOST useful information to determine mitigating controls?

A.

Forensic analysis

B.

Risk assessment

C.

Root cause analysis

D.

Business impact analysis (BlA)

Full Access
Question # 533

Which of the following risk register updates is MOST important for senior management to review?

A.

Extending the date of a future action plan by two months

B.

Retiring a risk scenario no longer used

C.

Avoiding a risk that was previously accepted

D.

Changing a risk owner

Full Access
Question # 534

Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?

A.

Avoidance

B.

Acceptance

C.

Mitigation

D.

Transfer

Full Access
Question # 535

Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?

A.

To allocate budget for resolution of risk issues

B.

To determine if new risk scenarios have been identified

C.

To ensure the project timeline is on target

D.

To track the status of risk mitigation actions

Full Access
Question # 536

An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?

A.

Review the risk identification process.

B.

Inform the risk scenario owners.

C.

Create a risk awareness communication plan.

D.

Update the risk register.

Full Access
Question # 537

A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls. Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?

A.

Identify previous data breaches using the startup company’s audit reports.

B.

Have the data privacy officer review the startup company’s data protection policies.

C.

Classify and protect the data according to the parent company ' s internal standards.

D.

Implement a firewall and isolate the environment from the parent company ' s network.

Full Access
Question # 538

A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization ' s applications. Which of the following MUST be aligned with the maximum allowable outage?

A.

Mean time to restore (MTTR)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to detect (MTTD)

Full Access
Question # 539

Which of the following BEST measures the efficiency of an incident response process?

A.

Number of incidents escalated to management

B.

Average time between changes and updating of escalation matrix

C.

Average gap between actual and agreed response times

D.

Number of incidents lacking responses

Full Access
Question # 540

Within the three lines of defense model, the responsibility for managing risk and controls resides with:

A.

operational management.

B.

the risk practitioner.

C.

the internal auditor.

D.

executive management.

Full Access
Question # 541

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r

A.

Prepare a business case for the response options.

B.

Identify resources for implementing responses.

C.

Develop a mechanism for monitoring residual risk.

D.

Update the risk register with the results.

Full Access
Question # 542

Which of the following is the PRIMARY reason to use administrative controls in conjunction with technical controls?

A.

To gain stakeholder support for the implementation of controls

B.

To comply with industry best practices by balancing multiple types of controls

C.

To improve the effectiveness of controls that mitigate risk

D.

To address multiple risk scenarios mitigated by technical controls

Full Access
Question # 543

Which of the following BEST enables senior management to make risk treatment decisions in line with the organization ' s risk appetite?

A.

Quantitative risk analysis

B.

Industry risk benchmarks

C.

Risk scenarios

D.

Risk remediation plans

Full Access
Question # 544

The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:

A.

encrypting the data

B.

including a nondisclosure clause in the CSP contract

C.

assessing the data classification scheme

D.

reviewing CSP access privileges

Full Access
Question # 545

What can be determined from the risk scenario chart?

A.

Relative positions on the risk map

B.

Risk treatment options

C.

Capability of enterprise to implement

D.

The multiple risk factors addressed by a chosen response

Full Access
Question # 546

IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:

A.

the cost associated with each control.

B.

historical risk assessments.

C.

key risk indicators (KRls).

D.

information from the risk register.

Full Access
Question # 547

Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?

A.

Service level agreement (SLA)

B.

Critical success factor (CSF)

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

Full Access
Question # 548

Which of the following is a risk practitioner ' s MOST appropriate course of action upon learning that an organization is not compliant with its patch management policy?

A.

Document the concern in an issue tracker.

B.

Strengthen data loss prevention (DLP) controls.

C.

Apply the most recent available patches.

D.

Escalate the issue to the ethics committee.

Full Access
Question # 549

Which of the following is the BEST indication of an effective risk management program?

A.

Risk action plans are approved by senior management.

B.

Residual risk is within the organizational risk appetite

C.

Mitigating controls are designed and implemented.

D.

Risk is recorded and tracked in the risk register

Full Access
Question # 550

Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?

A.

Directives from legal and regulatory authorities

B.

Audit reports from internal information systems audits

C.

Automated logs collected from different systems

D.

Trend analysis of external risk factors

Full Access
Question # 551

During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?

A.

Data validation

B.

Identification

C.

Authentication

D.

Data integrity

Full Access
Question # 552

Which of the following should be the MAIN consideration when validating an organization ' s risk appetite?

A.

Comparison against regulations

B.

Maturity of the risk culture

C.

Capacity to withstand loss

D.

Cost of risk mitigation options

Full Access
Question # 553

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

A.

The head of enterprise architecture (EA)

B.

The IT risk manager

C.

The information security manager

D.

The product owner

Full Access
Question # 554

Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?

A.

The model could be hacked or exploited.

B.

The model could be used to generate inaccurate content.

C.

Staff could become overly reliant on the model.

D.

It could lead to biased recommendations.

Full Access
Question # 555

Determining if organizational risk is tolerable requires:

A.

mapping residual risk with cost of controls

B.

comparing against regulatory requirements

C.

comparing industry risk appetite with the organizations.

D.

understanding the organization ' s risk appetite.

Full Access
Question # 556

An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?

A.

Review assignments of data ownership for key assets.

B.

Identify staff who have access to the organization’s sensitive data.

C.

Identify recent and historical incidents involving data loss.

D.

Review the organization ' s data inventory.

Full Access
Question # 557

Which of the following will BEST help to ensure that information system controls are effective?

A.

Responding promptly to control exceptions

B.

Implementing compensating controls

C.

Testing controls periodically

D.

Automating manual controls

Full Access
Question # 558

Which of the following would prompt changes in key risk indicator {KRI) thresholds?

A.

Changes to the risk register

B.

Changes in risk appetite or tolerance

C.

Modification to risk categories

D.

Knowledge of new and emerging threats

Full Access
Question # 559

The PRIMARY benefit associated with key risk indicators (KRls) is that they:

A.

help an organization identify emerging threats.

B.

benchmark the organization ' s risk profile.

C.

identify trends in the organization ' s vulnerabilities.

D.

enable ongoing monitoring of emerging risk.

Full Access
Question # 560

Which of the following should be the PRIMARY basis for establishing a priority sequence when restoring business processes after a disruption?

A.

Recovery Time Objective (RTO)

B.

Mean Time to Recover (MTTR)

C.

Mean Time Between Failures (MTBF)

D.

Recovery Point Objective (RPO)

Full Access
Question # 561

When developing IT risk scenarios, it is MOST important to consider:

A.

The industry ' s threat profile.

B.

Incidents occurring at similar organizations.

C.

System performance thresholds.

D.

Organizational objectives.

Full Access
Question # 562

Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?

A.

The model could be hacked or exploited.

B.

The model could be used to generate inaccurate content.

C.

Staff could become overly reliant on the model.

D.

It could lead to biased recommendations.

Full Access
Question # 563

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

A.

The percentage of servers with allowed patching exceptions

B.

The number of servers with local credentials to install patches

C.

The percentage of servers patched within required service level agreements

D.

The number of servers running the software patching service

Full Access
Question # 564

A public online information security training course is available to an organization ' s staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization ' s risk practitioner?

A.

The form may be susceptible to SQL injection attacks.

B.

Data is not encrypted in transit to the site.

C.

Proprietary corporate information may be disclosed.

D.

Staff nondisclosure agreements (NDAs) are not in place.

Full Access
Question # 565

An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?

A.

Database manager

B.

Public relations manager

C.

Data privacy manager

D.

Business manager

Full Access
Question # 566

The MAIN purpose of a risk register is to:

A.

document the risk universe of the organization.

B.

promote an understanding of risk across the organization.

C.

enable well-informed risk management decisions.

D.

identify stakeholders associated with risk scenarios.

Full Access
Question # 567

When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?

A.

Emphasize individual responsibility for managing risk.

B.

Communicate incident escalation procedures.

C.

Illustrate methods to identify threats and vulnerabilities.

D.

Challenge the effectiveness of business processes.

Full Access
Question # 568

Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization ' s policies?

A.

Third line of defense

B.

Line of defense subject matter experts

C.

Second line of defense

D.

First line of defense

Full Access
Question # 569

Which of the following is a risk practitioner ' s BEST recommendation regarding disaster recovery management (DRM) for Software as a Service (SaaS) providers?

A.

Conduct inoremental backups of data in the SaaS environment to a local data center.

B.

Implement segregation of duties between multiple SaaS solution providers.

C.

Codify availability requirements in the SaaS provider ' s contract.

D.

Conduct performance benchmarking against other SaaS service providers.

Full Access
Question # 570

Which of the following is MOST critical to the design of relevant risk scenarios?

A.

The scenarios are based on past incidents.

B.

The scenarios are linked to probable organizational situations.

C.

The scenarios are mapped to incident management capabilities.

D.

The scenarios are aligned with risk management capabilities.

Full Access
Question # 571

After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:

A.

prepare a follow-up risk assessment.

B.

recommend acceptance of the risk scenarios.

C.

reconfirm risk tolerance levels.

D.

analyze changes to aggregate risk.

Full Access
Question # 572

Which of the following is a risk practitioner ' s BEST course of action upon learning that a control under internal review may no longer be necessary?

A.

Obtain approval to retire the control.

B.

Update the status of the control as obsolete.

C.

Consult the internal auditor for a second opinion.

D.

Verify the effectiveness of the original mitigation plan.

Full Access
Question # 573

Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST

A.

review the key risk indicators.

B.

conduct a risk analysis.

C.

update the risk register

D.

reallocate risk response resources.

Full Access
Question # 574

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

A.

Control effectiveness

B.

Risk appetite

C.

Risk likelihood

D.

Key risk indicator (KRI)

Full Access
Question # 575

When an organization ' s business continuity plan (BCP) states that it cannot afford to lose more than three hours of a critical application ' s data, the three hours is considered the application’s:

A.

Maximum tolerable outage (MTO).

B.

Recovery point objective (RPO).

C.

Mean time to restore (MTTR).

D.

Recovery time objective (RTO).

Full Access
Question # 576

An IT risk threat analysis is BEST used to establish

A.

risk scenarios

B.

risk maps

C.

risk appetite

D.

risk ownership.

Full Access
Question # 577

Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation ' ?

A.

User acceptance testing (UAT)

B.

Database activity monitoring

C.

Source code review

D.

Vulnerability analysis

Full Access
Question # 578

Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?

A.

Updating the risk register to include the risk mitigation plan

B.

Determining processes for monitoring the effectiveness of the controls

C.

Ensuring that control design reduces risk to an acceptable level

D.

Confirming to management the controls reduce the likelihood of the risk

Full Access
Question # 579

When outsourcing a business process to a cloud service provider, it is MOST important to understand that:

A.

insurance could be acquired for the risk associated with the outsourced process.

B.

service accountability remains with the cloud service provider.

C.

a risk owner must be designated within the cloud service provider.

D.

accountability for the risk will remain with the organization.

Full Access
Question # 580

Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?

A.

Risk and control self-assessment (CSA) reports

B.

Information generated by the systems

C.

Control environment narratives

D.

Confirmation from industry peers

Full Access
Question # 581

A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?

A.

Risk likelihood

B.

Risk impact

C.

Risk capacity

D.

Risk appetite

Full Access