Month End Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Certified in Risk and Information Systems Control Question and Answers

Certified in Risk and Information Systems Control

Last Update May 23, 2025
Total Questions : 1608

We are offering FREE CRISC Isaca exam questions. All you do is to just go and sign up. Give your details, prepare CRISC free exam questions and then go for complete pool of Certified in Risk and Information Systems Control test questions that will help you more.

CRISC pdf

CRISC PDF

$36.75  $104.99
CRISC Engine

CRISC Testing Engine

$43.75  $124.99
CRISC PDF + Engine

CRISC PDF + Testing Engine

$57.75  $164.99
Questions 1

When assigning control ownership, it is MOST important to verify that the owner has accountability for:

Options:

A.  

Control effectiveness.

B.  

The budget for control implementation.

C.  

Assessment of control risk.

D.  

Internal control audits.

Discussion 0
Questions 2

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

Options:

A.  

Invoke the disaster recovery plan during an incident.

B.  

Prepare a cost-benefit analysis of alternatives available

C.  

Implement redundant infrastructure for the application.

D.  

Reduce the recovery time by strengthening the response team.

Discussion 0
Questions 3

Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?

Options:

A.  

Segregation of duties

B.  

Code review

C.  

Change management

D.  

Audit modules

Discussion 0
Questions 4

A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:

Options:

A.  

implement the planned controls and accept the remaining risk.

B.  

suspend the current action plan in order to reassess the risk.

C.  

revise the action plan to include additional mitigating controls.

D.  

evaluate whether selected controls are still appropriate.

Discussion 0
Questions 5

Which of the following BEST indicates that an organizations risk management program is effective?

Options:

A.  

Fewer security incidents have been reported.

B.  

The number of audit findings has decreased.

C.  

Residual risk is reduced.

D.  

inherent risk Is unchanged.

Discussion 0
Questions 6

Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?

Options:

A.  

Detective control

B.  

Deterrent control

C.  

Preventive control

D.  

Corrective control

Discussion 0
Questions 7

Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?

Options:

A.  

Enable data wipe capabilities

B.  

Penetration testing and session timeouts

C.  

Implement remote monitoring

D.  

Enforce strong passwords and data encryption

Discussion 0
Questions 8

A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?

Options:

A.  

Control owner

B.  

Risk owner

C.  

IT security manager

D.  

Control operator

Discussion 0
Questions 9

Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?

Options:

A.  

Objectives are confirmed with the business owner.

B.  

Control owners approve control changes.

C.  

End-user acceptance testing has been conducted.

D.  

Performance information in the log is encrypted.

Discussion 0
Questions 10

A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?

Options:

A.  

Identify changes in risk factors and initiate risk reviews.

B.  

Engage an external consultant to redesign the risk management process.

C.  

Outsource the process for updating the risk register.

D.  

Implement a process improvement and replace the old risk register.

Discussion 0
Questions 11

When evaluating a number of potential controls for treating risk, it is MOST important to consider:

Options:

A.  

risk appetite and control efficiency.

B.  

inherent risk and control effectiveness.

C.  

residual risk and cost of control.

D.  

risk tolerance and control complexity.

Discussion 0
Questions 12

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

Options:

A.  

Comparative analysis of peer companies

B.  

Reviews of brokerage firm assessments

C.  

Interviews with senior management

D.  

Trend analysis using prior annual reports

Discussion 0
Questions 13

Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?

Options:

A.  

Some IT risk scenarios have multi-year risk action plans.

B.  

Several IT risk scenarios are missing assigned owners.

C.  

Numerous IT risk scenarios have been granted risk acceptances.

D.  

Many IT risk scenarios are categorized as avoided.

Discussion 0
Questions 14

Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?

Options:

A.  

Control owner

B.  

Risk manager

C.  

Control operator

D.  

Risk treatment owner

Discussion 0
Questions 15

Who should be responsible (of evaluating the residual risk after a compensating control has been

Options:

A.  

Compliance manager

B.  

Risk owner

C.  

Control owner

D.  

Risk practitioner

Discussion 0
Questions 16

A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?

Options:

A.  

Negotiating terms of adoption

B.  

Understanding the timeframe to implement

C.  

Completing a gap analysis

D.  

Initiating the conversion

Discussion 0
Questions 17

Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?

Options:

A.  

Cyber insurance

B.  

Data backups

C.  

Incident response plan

D.  

Key risk indicators (KRIs)

Discussion 0
Questions 18

Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?

Options:

A.  

Business impact assessment (BIA)

B.  

Key performance indicators (KPIs)

C.  

Risk profile

D.  

Industry benchmark analysis

Discussion 0
Questions 19

Which of the following would BEST indicate to senior management that IT processes are improving?

Options:

A.  

Changes in the number of intrusions detected

B.  

Changes in the number of security exceptions

C.  

Changes in the position in the maturity model

D.  

Changes to the structure of the risk register

Discussion 0
Questions 20

A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?

Options:

A.  

Conduct a risk assessment with stakeholders.

B.  

Conduct third-party resilience tests.

C.  

Update the risk register with the process changes.

D.  

Review risk related to standards and regulations.

Discussion 0
Questions 21

Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?

Options:

A.  

The number of stakeholders involved in IT risk identification workshops

B.  

The percentage of corporate budget allocated to IT risk activities

C.  

The percentage of incidents presented to the board

D.  

The number of executives attending IT security awareness training

Discussion 0
Questions 22

Which of the following is MOST critical when designing controls?

Options:

A.  

Involvement of internal audit

B.  

Involvement of process owner

C.  

Quantitative impact of the risk

D.  

Identification of key risk indicators

Discussion 0
Questions 23

A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:

Options:

A.  

based on industry trends.

B.  

mapped to incident response plans.

C.  

related to probable events.

D.  

aligned with risk management capabilities.

Discussion 0
Questions 24

Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?

Options:

A.  

The vendor must provide periodic independent assurance reports.

B.  

The vendor must host data in a specific geographic location.

C.  

The vendor must be held liable for regulatory fines for failure to protect data.

D.  

The vendor must participate in an annual vendor performance review.

Discussion 0
Questions 25

Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?

Options:

A.  

Key performance indicators (KPIs)

B.  

Risk heat maps

C.  

Internal audit findings

D.  

Periodic penetration testing

Discussion 0
Questions 26

A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?

Options:

A.  

Request a regulatory risk reporting methodology

B.  

Require critical success factors (CSFs) for IT risks.

C.  

Establish IT-specific compliance objectives

D.  

Communicate IT key risk indicators (KRIs) and triggers

Discussion 0
Questions 27

What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?

Options:

A.  

Use the severity rating to calculate risk.

B.  

Classify the risk scenario as low-probability.

C.  

Use the highest likelihood identified by risk management.

D.  

Rely on range-based estimates provided by subject-matter experts.

Discussion 0
Questions 28

Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?

Options:

A.  

Cost of implementation

B.  

Implementation of unproven applications

C.  

Disruption to business processes

D.  

Increase in attack surface area

Discussion 0
Questions 29

Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization's data flow model?

Options:

A.  

Results of data classification activities

B.  

Recent changes to enterprise architecture (EA)

C.  

High-level network diagrams

D.  

Notes from interviews with the data owners

Discussion 0
Questions 30

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

Options:

A.  

Approval by senior management

B.  

Low cost of development and maintenance

C.  

Sensitivity to changes in risk levels

D.  

Use of industry risk data sources

Discussion 0
Questions 31

Which of the following is the GREATEST risk associated with the transition of a sensitive data backup solution from on-premise to a cloud service provider?

Options:

A.  

More complex test restores

B.  

Inadequate service level agreement (SLA) with the provider

C.  

More complex incident response procedures

D.  

Inadequate data encryption

Discussion 0
Questions 32

Which of the following MUST be updated to maintain an IT risk register?

Options:

A.  

Expected frequency and potential impact

B.  

Risk tolerance

C.  

Enterprise-wide IT risk assessment

D.  

Risk appetite

Discussion 0
Questions 33

The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:

Options:

A.  

the risk strategy is appropriate

B.  

KRIs and KPIs are aligned

C.  

performance of controls is adequate

D.  

the risk monitoring process has been established

Discussion 0
Questions 34

A migration from an in-house developed system to an external cloud-based solution is affecting a previously rated key risk scenario related to payroll processing. Which part of the risk register should be updated FIRST?

Options:

A.  

Payroll system risk factors

B.  

Payroll system risk mitigation plans

C.  

Payroll process owner

D.  

Payroll administrative controls

Discussion 0
Questions 35

When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?

Options:

A.  

BCP testing is net in conjunction with the disaster recovery plan (DRP)

B.  

Recovery time objectives (RTOs) do not meet business requirements.

C.  

BCP is often tested using the walk-through method.

D.  

Each business location has separate, inconsistent BCPs.

Discussion 0
Questions 36

To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:

Options:

A.  

require the vendor to sign a nondisclosure agreement

B.  

clearly define the project scope.

C.  

perform background checks on the vendor.

D.  

notify network administrators before testing

Discussion 0
Questions 37

A risk practitioner has learned that the number of emergency change management tickets without subsequent approval has doubled from the same period of the previous year. Which of the following is the MOST important action for the risk practitioner to take?

Options:

A.  

Review the cause of the control failure.

B.  

Temporarily suspend emergency changes.

C.  

Recommend remedial training.

D.  

Initiate a review of the change management process.

Discussion 0
Questions 38

Which of the following would BEST ensure that identified risk scenarios are addressed?

Options:

A.  

Reviewing the implementation of the risk response

B.  

Creating a separate risk register for key business units

C.  

Performing real-time monitoring of threats

D.  

Performing regular risk control self-assessments

Discussion 0
Questions 39

Which of the following BEST facilitates the identification of emerging risk?

Options:

A.  

Performing scenario-based assessments

B.  

Reviewing audit reports annually

C.  

Conducting root cause analyses

D.  

Engaging a risk-focused audit team

Discussion 0
Questions 40

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

Options:

A.  

Implementing risk treatment plans

B.  

Validating the status of risk mitigation efforts

C.  

Establishing risk policies and standards

D.  

Conducting independent reviews of risk assessment results

Discussion 0
Questions 41

A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:

Options:

A.  

updating the risk register.

B.  

validating the risk scenarios.

C.  

documenting the risk scenarios.

D.  

identifying risk mitigation controls.

Discussion 0
Questions 42

Which of the following is the MAIN reason to continuously monitor IT-related risk?

Options:

A.  

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.  

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.  

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.  

To help identify root causes of incidents and recommend suitable long-term solutions

Discussion 0
Questions 43

Which of the following is the BEST way to address IT regulatory compliance risk?

Options:

A.  

Assign highest priority to remediation of related risk scenarios.

B.  

Prevent acceptance of related risk scenarios.

C.  

Conduct specialized business impact analyses (BIAs).

D.  

Manage risk like other types of operational risk.

Discussion 0
Questions 44

Which of the following should be the PRIMARY basis for prioritizing risk responses?

Options:

A.  

The impact of the risk

B.  

The replacement cost of the business asset

C.  

The cost of risk mitigation controls

D.  

The classification of the business asset

Discussion 0
Questions 45

Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?

Options:

A.  

Total cost of ownership

B.  

Resource dependency analysis

C.  

Cost-benefit analysis

D.  

Business impact analysis

Discussion 0
Questions 46

The percentage of unpatched systems is a:

Options:

A.  

threat vector.

B.  

critical success factor (CSF).

C.  

key performance indicator (KPI).

D.  

key risk indicator (KRI).

Discussion 0
Questions 47

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

Options:

A.  

Cost of controls

B.  

Risk tolerance

C.  

Risk appetite

D.  

Probability definition

Discussion 0
Questions 48

The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?

Options:

A.  

Perform a root cause analysis

B.  

Perform a code review

C.  

Implement version control software.

D.  

Implement training on coding best practices

Discussion 0
Questions 49

Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application'?

Options:

A.  

The third-party risk manager

B.  

The application vendor

C.  

The business process owner

D.  

The information security manager

Discussion 0
Questions 50

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

Options:

A.  

Increase in the frequency of changes

B.  

Percent of unauthorized changes

C.  

Increase in the number of emergency changes

D.  

Average time to complete changes

Discussion 0
Questions 51

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?

Options:

A.  

Number of users that participated in the DRP testing

B.  

Number of issues identified during DRP testing

C.  

Percentage of applications that met the RTO during DRP testing

D.  

Percentage of issues resolved as a result of DRP testing

Discussion 0
Questions 52

Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''

Options:

A.  

A summary of risk response plans with validation results

B.  

A report with control environment assessment results

C.  

A dashboard summarizing key risk indicators (KRIs)

D.  

A summary of IT risk scenarios with business cases

Discussion 0
Questions 53

Which of the following is MOST important to understand when determining an appropriate risk assessment approach?

Options:

A.  

Complexity of the IT infrastructure

B.  

Value of information assets

C.  

Management culture

D.  

Threats and vulnerabilities

Discussion 0
Questions 54

Which of the following should be included in a risk scenario to be used for risk analysis?

Options:

A.  

Risk appetite

B.  

Threat type

C.  

Risk tolerance

D.  

Residual risk

Discussion 0
Questions 55

Which of the following methods would BEST contribute to identifying obscure risk scenarios?

Options:

A.  

Brainstorming sessions

B.  

Control self-assessments

C.  

Vulnerability analysis

D.  

Monte Carlo analysis

Discussion 0
Questions 56

Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?

Options:

A.  

Number of projects going live without a security review

B.  

Number of employees completing project-specific security training

C.  

Number of security projects started in core departments

D.  

Number of security-related status reports submitted by project managers

Discussion 0
Questions 57

An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?

Options:

A.  

Sections of the policy that may justify not implementing the requirement

B.  

Risk associated with the inability to implement the requirement

C.  

Budget justification to implement the new requirement during the current year

D.  

Industry best practices with respect to implementation of the proposed control

Discussion 0
Questions 58

Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

Options:

A.  

To ensure IT risk management is focused on mitigating emerging risk

B.  

To confirm that IT risk assessment results are expressed in quantitative terms

C.  

To evaluate threats to the organization's operations and strategy

D.  

To identify gaps in the alignment of IT risk management processes and strategy

Discussion 0
Questions 59

Which of the following is MOST essential for an effective change control environment?

Options:

A.  

Business management approval of change requests

B.  

Separation of development and production environments

C.  

Requirement of an implementation rollback plan

D.  

IT management review of implemented changes

Discussion 0
Questions 60

An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?

Options:

A.  

Number of customer records held

B.  

Number of databases that host customer data

C.  

Number of encrypted customer databases

D.  

Number of staff members having access to customer data

Discussion 0
Questions 61

Which of the following should be the PRIMARY objective of a risk awareness training program?

Options:

A.  

To enable risk-based decision making

B.  

To promote awareness of the risk governance function

C.  

To clarify fundamental risk management principles

D.  

To ensure sufficient resources are available

Discussion 0
Questions 62

While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?

Options:

A.  

Ensuring the vendor does not know the encryption key

B.  

Engaging a third party to validate operational controls

C.  

Using the same cloud vendor as a competitor

D.  

Using field-level encryption with a vendor supplied key

Discussion 0
Questions 63

Which of the following is the BEST course of action for a system administrator who suspects a colleague may be intentionally weakening a system's validation controls in order to pass through fraudulent transactions?

Options:

A.  

Implement compensating controls to deter fraud attempts.

B.  

Share the concern through a whistleblower communication channel.

C.  

Monitor the activity to collect evidence.

D.  

Determine whether the system environment has flaws that may motivate fraud attempts.

Discussion 0
Questions 64

Which of the following is the MOST important outcome of reviewing the risk management process?

Options:

A.  

Assuring the risk profile supports the IT objectives

B.  

Improving the competencies of employees who performed the review

C.  

Determining what changes should be made to IS policies to reduce risk

D.  

Determining that procedures used in risk assessment are appropriate

Discussion 0
Questions 65

Which of the following MOST effectively limits the impact of a ransomware attack?

Options:

A.  

Cyber insurance

B.  

Cryptocurrency reserve

C.  

Data backups

D.  

End user training

Discussion 0
Questions 66

What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?

Options:

A.  

Potential loss to tie business due to non-performance of the asset

B.  

Known emerging environmental threats

C.  

Known vulnerabilities published by the asset developer

D.  

Cost of replacing the asset with a new asset providing similar services

Discussion 0
Questions 67

Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?

Options:

A.  

Analyzing cyber intelligence reports

B.  

Engaging independent cybersecurity consultants

C.  

Increasing the frequency of updates to the risk register

D.  

Reviewing the outcome of the latest security risk assessment

Discussion 0
Questions 68

Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?

Options:

A.  

The model could be hacked or exploited.

B.  

The model could be used to generate inaccurate content.

C.  

Staff could become overly reliant on the model.

D.  

It could lead to biased recommendations.

Discussion 0
Questions 69

Which of the following should be the PRIMARY focus of an independent review of a risk management process?

Options:

A.  

Accuracy of risk tolerance levels

B.  

Consistency of risk process results

C.  

Participation of stakeholders

D.  

Maturity of the process

Discussion 0
Questions 70

Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?

Options:

A.  

Senior management demonstrates ethics in their day-to-day decision making.

B.  

An independent ethics investigation team has been established.

C.  

Employees are required to complete ethics training courses annually.

D.  

The risk practitioner is required to consult with the ethics committee.

Discussion 0
Questions 71

Which of the following is the BEST way to quantify the likelihood of risk materialization?

Options:

A.  

Balanced scorecard

B.  

Threat and vulnerability assessment

C.  

Compliance assessments

D.  

Business impact analysis (BIA)

Discussion 0
Questions 72

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

Options:

A.  

data logging and monitoring

B.  

data mining and analytics

C.  

data classification and labeling

D.  

data retention and destruction

Discussion 0
Questions 73

A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?

Options:

A.  

Develop a risk action plan to address the findings.

B.  

Evaluate the impact of the vulnerabilities to the business application.

C.  

Escalate the findings to senior management and internal audit.

D.  

Conduct a penetration test to validate the vulnerabilities from the findings.

Discussion 0
Questions 74

A risk practitioner is preparing a report to communicate changes in the risk and control environment. The BEST way to engage stakeholder attention is to:

Options:

A.  

include detailed deviations from industry benchmarks,

B.  

include a summary linking information to stakeholder needs,

C.  

include a roadmap to achieve operational excellence,

D.  

publish the report on-demand for stakeholders.

Discussion 0
Questions 75

When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?

Options:

A.  

Results of benchmarking studies

B.  

Results of risk assessments

C.  

Number of emergency change requests

D.  

Maturity model

Discussion 0
Questions 76

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

Options:

A.  

Risk analysis results

B.  

Exception handling policy

C.  

Vulnerability assessment results

D.  

Benchmarking assessments

Discussion 0
Questions 77

Which of the following is the BEST method to track asset inventory?

Options:

A.  

Periodic asset review by management

B.  

Asset registration form

C.  

Automated asset management software

D.  

IT resource budgeting process

Discussion 0
Questions 78

Which of the following is the MOST essential characteristic of a good IT risk scenario?

Options:

A.  

The scenario is aligned to business control processes.

B.  

The scenario is aligned to the organization’s risk appetite and tolerance.

C.  

The scenario is aligned to a business objective.

D.  

The scenario is aligned to known vulnerabilities in information technology.

Discussion 0
Questions 79

Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?

Options:

A.  

Self-assessments by process owners

B.  

Mitigation plan progress reports

C.  

Risk owner attestation

D.  

Change in the level of residual risk

Discussion 0
Questions 80

Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?

Options:

A.  

Benchmarking parameters likely to affect the results

B.  

Tools and techniques used by risk owners to perform the assessments

C.  

A risk heat map with a summary of risk identified and assessed

D.  

The possible impact of internal and external risk factors on the assessment results

Discussion 0
Questions 81

During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?

Options:

A.  

Conduct a comprehensive review of access management processes.

B.  

Declare a security incident and engage the incident response team.

C.  

Conduct a comprehensive awareness session for system administrators.

D.  

Evaluate system administrators' technical skills to identify if training is required.

Discussion 0
Questions 82

An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?

Options:

A.  

Report the observation to the chief risk officer (CRO).

B.  

Validate the adequacy of the implemented risk mitigation measures.

C.  

Update the risk register with the implemented risk mitigation actions.

D.  

Revert the implemented mitigation measures until approval is obtained

Discussion 0
Questions 83

The BEST metric to demonstrate that servers are configured securely is the total number of servers:

Options:

A.  

exceeding availability thresholds

B.  

experiencing hardware failures

C.  

exceeding current patching standards.

D.  

meeting the baseline for hardening.

Discussion 0
Questions 84

Which of the following is MOST helpful to understand the consequences of an IT risk event?

Options:

A.  

Fault tree analysis

B.  

Historical trend analysis

C.  

Root cause analysis

D.  

Business impact analysis (BIA)

Discussion 0
Questions 85

In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?

Options:

A.  

Board of directors

B.  

Risk officers

C.  

Line management

D.  

Senior management

Discussion 0
Questions 86

Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?

Options:

A.  

Changes in the organization's risk appetite and risk tolerance levels

B.  

Impact due to changes in external and internal risk factors

C.  

Changes in residual risk levels against acceptable levels

D.  

Gaps in best practices and implemented controls across the industry

Discussion 0
Questions 87

Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?

Options:

A.  

Physical destruction

B.  

Degaussing

C.  

Data anonymization

D.  

Data deletion

Discussion 0
Questions 88

Which of the following represents a vulnerability?

Options:

A.  

An identity thief seeking to acquire personal financial data from an organization

B.  

Media recognition of an organization's market leadership in its industry

C.  

A standard procedure for applying software patches two weeks after release

D.  

An employee recently fired for insubordination

Discussion 0
Questions 89

Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?

Options:

A.  

Customer notification plans

B.  

Capacity management

C.  

Access management

D.  

Impacts on IT project delivery

Discussion 0
Questions 90

Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?

Options:

A.  

IT management

B.  

Internal audit

C.  

Process owners

D.  

Senior management

Discussion 0
Questions 91

Which of the following provides the MOST useful information when developing a risk profile for management approval?

Options:

A.  

Residual risk and risk appetite

B.  

Strength of detective and preventative controls

C.  

Effectiveness and efficiency of controls

D.  

Inherent risk and risk tolerance

Discussion 0
Questions 92

A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?

Options:

A.  

Increase in compliance breaches

B.  

Increase in loss event impact

C.  

Increase in residual risk

D.  

Increase in customer complaints

Discussion 0
Questions 93

Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?

Options:

A.  

Key risk indicators (KRIs)

B.  

The owner of the financial reporting process

C.  

The risk rating of affected financial processes

D.  

The list of relevant financial controls

Discussion 0
Questions 94

To define the risk management strategy which of the following MUST be set by the board of directors?

Options:

A.  

Operational strategies

B.  

Risk governance

C.  

Annualized loss expectancy (ALE)

D.  

Risk appetite

Discussion 0
Questions 95

Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?

Options:

A.  

Facilitating risk-aware decision making by stakeholders

B.  

Demonstrating management commitment to mitigate risk

C.  

Closing audit findings on a timely basis

D.  

Ensuring compliance to industry standards

Discussion 0
Questions 96

Which risk response strategy could management apply to both positive and negative risk that has been identified?

Options:

A.  

Transfer

B.  

Accept

C.  

Exploit

D.  

Mitigate

Discussion 0
Questions 97

Which of the following BEST supports the management of identified risk scenarios?

Options:

A.  

Collecting risk event data

B.  

Maintaining a risk register

C.  

Using key risk indicators (KRIs)

D.  

Defining risk parameters

Discussion 0
Questions 98

Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?

Options:

A.  

Improved alignment will technical risk

B.  

Better-informed business decisions

C.  

Enhanced understanding of enterprise architecture (EA)

D.  

Improved business operations efficiency

Discussion 0
Questions 99

Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?

Options:

A.  

Key risk indicators (KRls) are developed for key IT risk scenarios

B.  

IT risk scenarios are assessed by the enterprise risk management team

C.  

Risk appetites for IT risk scenarios are approved by key business stakeholders.

D.  

IT risk scenarios are developed in the context of organizational objectives.

Discussion 0
Questions 100

An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?

Options:

A.  

Risk manager

B.  

Data owner

C.  

End user

D.  

IT department

Discussion 0
Questions 101

An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

Options:

A.  

Recommend risk remediation

B.  

Change the level of risk appetite

C.  

Document formal acceptance of the risk

D.  

Reject the business initiative

Discussion 0
Questions 102

Which of the following would BEST facilitate the implementation of data classification requirements?

Options:

A.  

Assigning a data owner

B.  

Scheduling periodic audits

C.  

Implementing technical controls over the assets

D.  

Implementing a data loss prevention (DLP) solution

Discussion 0
Questions 103

Well-developed, data-driven risk measurements should be:

Options:

A.  

reflective of the lowest organizational level.

B.  

a data feed taken directly from operational production systems.

C.  

reported to management the same day data is collected.

D.  

focused on providing a forward-looking view.

Discussion 0
Questions 104

Which types of controls are BEST used to minimize the risk associated with a vulnerability?

Options:

A.  

Detective

B.  

Preventive

C.  

Deterrent

D.  

Directive

Discussion 0
Questions 105

What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?

Options:

A.  

Segment the system on its own network.

B.  

Ensure regular backups take place.

C.  

Virtualize the system in the cloud.

D.  

Install antivirus software on the system.

Discussion 0
Questions 106

Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?

Options:

A.  

Application monitoring

B.  

Separation of duty

C.  

Least privilege

D.  

Nonrepudiation

Discussion 0
Questions 107

Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?

Options:

A.  

Monitoring digital platforms that disseminate inaccurate or misleading news stories

B.  

Engaging public relations personnel to debunk false stories and publications

C.  

Restricting the use of social media on corporate networks during specific hours

D.  

Providing awareness training to understand and manage these types of attacks

Discussion 0
Questions 108

Which of the following will BEST quantify the risk associated with malicious users in an organization?

Options:

A.  

Business impact analysis

B.  

Risk analysis

C.  

Threat risk assessment

D.  

Vulnerability assessment

Discussion 0
Questions 109

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

Options:

A.  

A privacy impact assessment has not been completed.

B.  

Data encryption methods apply to a subset of Pll obtained.

C.  

The data privacy officer was not consulted.

D.  

Insufficient access controls are used on the loT devices.

Discussion 0
Questions 110

Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?

Options:

A.  

Identify information security controls in the requirements analysis

B.  

Identify key risk indicators (KRIs) as process output.

C.  

Design key performance indicators (KPIs) for security in system specifications.

D.  

Include information security control specifications in business cases.

Discussion 0
Questions 111

Which of the following BEST helps to balance the costs and benefits of managing IT risk?

Options:

A.  

Prioritizing risk responses

B.  

Evaluating risk based on frequency and probability

C.  

Considering risk factors that can be quantified

D.  

Managing the risk by using controls

Discussion 0
Questions 112

Which of the following roles is PRIMARILY accountable for risk associated with business information protection?

Options:

A.  

Control owner

B.  

Data owner

C.  

System owner

D.  

Application owner

Discussion 0
Questions 113

Which of the following should be the PRIMARY recipient of reports showing the

progress of a current IT risk mitigation project?

Options:

A.  

Senior management

B.  

Project manager

C.  

Project sponsor

D.  

IT risk manager

Discussion 0
Questions 114

Which of the following is the BEST method to identify unnecessary controls?

Options:

A.  

Evaluating the impact of removing existing controls

B.  

Evaluating existing controls against audit requirements

C.  

Reviewing system functionalities associated with business processes

D.  

Monitoring existing key risk indicators (KRIs)

Discussion 0
Questions 115

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner's NEXT step?

Options:

A.  

Develop a mechanism for monitoring residual risk.

B.  

Update the risk register with the results.

C.  

Prepare a business case for the response options.

D.  

Identify resources for implementing responses.

Discussion 0
Questions 116

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?

Options:

A.  

Collaborate with the risk owner to determine the risk response plan.

B.  

Document the gap in the risk register and report to senior management.

C.  

Include a right to audit clause in the service provider contract.

D.  

Advise the risk owner to accept the risk.

Discussion 0
Questions 117

Upon learning that the number of failed backup attempts continually exceeds

the current risk threshold, the risk practitioner should:

Options:

A.  

initiate corrective action to address the known deficiency.

B.  

adjust the risk threshold to better reflect actual performance.

C.  

inquire about the status of any planned corrective actions.

D.  

keep monitoring the situation as there is evidence that this is normal.

Discussion 0
Questions 118

An organization becomes aware that IT security failed to detect a coordinated

cyber attack on its data center. Which of the following is the BEST course of

action?

Options:

A.  

Perform a business impact analysis (BIA).

B.  

Identify compensating controls

C.  

Conduct a root cause analysis.

D.  

Revise key risk indicator (KRI) thresholds.

Discussion 0
Questions 119

Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?

Options:

A.  

Review the vendor selection process and vetting criteria.

B.  

Assess whether use of service falls within risk tolerance thresholds.

C.  

Establish service level agreements (SLAs) with the vendor.

D.  

Check the contract for appropriate security risk and control provisions.

Discussion 0
Questions 120

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

Options:

A.  

Vulnerability scanning

B.  

Systems log correlation analysis

C.  

Penetration testing

D.  

Monitoring of intrusion detection system (IDS) alerts

Discussion 0
Questions 121

Which of the following is the BEST indication of a mature organizational risk culture?

Options:

A.  

Corporate risk appetite is communicated to staff members.

B.  

Risk owners understand and accept accountability for risk.

C.  

Risk policy has been published and acknowledged by employees.

D.  

Management encourages the reporting of policy breaches.

Discussion 0
Questions 122

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

Options:

A.  

Creating a data classification scheme

B.  

Identifying events impacting continuity of operations

C.  

Analyzing previous risk assessment results

D.  

Identifying critical information assets

Discussion 0
Questions 123

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

Options:

A.  

Implement a tool to create and distribute violation reports

B.  

Raise awareness of encryption requirements for sensitive data.

C.  

Block unencrypted outgoing emails which contain sensitive data.

D.  

Implement a progressive disciplinary process for email violations.

Discussion 0
Questions 124

The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?

Options:

A.  

Insufficient risk tolerance

B.  

Optimized control management

C.  

Effective risk management

D.  

Over-controlled environment

Discussion 0
Questions 125

Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?

Options:

A.  

Perform a gap analysis

B.  

Conduct system testing

C.  

Implement compensating controls

D.  

Update security policies

Discussion 0
Questions 126

Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?

Options:

A.  

Risk magnitude

B.  

Incident probability

C.  

Risk appetite

D.  

Cost-benefit analysis

Discussion 0
Questions 127

Which of the following can be interpreted from a single data point on a risk heat map?

Options:

A.  

Risk tolerance

B.  

Risk magnitude

C.  

Risk response

D.  

Risk appetite

Discussion 0
Questions 128

Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?

Options:

A.  

Loss expectancy information

B.  

Control performance predictions

C.  

IT service level agreements (SLAs)

D.  

Remediation activity progress

Discussion 0
Questions 129

An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?

Options:

A.  

Whether the service provider's data center is located in the same country

B.  

Whether the data sent by email has been encrypted

C.  

Whether the data has been appropriately classified

D.  

Whether the service provider contract allows right of onsite audit

Discussion 0
Questions 130

Which of the following is the GREATEST benefit of identifying appropriate risk owners?

Options:

A.  

Accountability is established for risk treatment decisions

B.  

Stakeholders are consulted about risk treatment options

C.  

Risk owners are informed of risk treatment options

D.  

Responsibility is established for risk treatment decisions.

Discussion 0
Questions 131

Which of the following is the BEST way to support communication of emerging risk?

Options:

A.  

Update residual risk levels to reflect the expected risk impact.

B.  

Adjust inherent risk levels upward.

C.  

Include it on the next enterprise risk committee agenda.

D.  

Include it in the risk register for ongoing monitoring.

Discussion 0
Questions 132

The PRIMARY benefit of using a maturity model is that it helps to evaluate the:

Options:

A.  

capability to implement new processes

B.  

evolution of process improvements

C.  

degree of compliance with policies and procedures

D.  

control requirements.

Discussion 0
Questions 133

Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?

Options:

A.  

Cyber threat intelligence

B.  

Anti-malware software

C.  

Endpoint detection and response (EDR)

D.  

SIEM systems

Discussion 0
Questions 134

When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?

Options:

A.  

Risk action plans and associated owners

B.  

Recent audit and self-assessment results

C.  

Potential losses compared to treatment cost

D.  

A list of assets exposed to the highest risk

Discussion 0
Questions 135

Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

Options:

A.  

It maintains evidence of compliance with risk policy.

B.  

It facilitates timely risk-based decisions.

C.  

It validates the organization's risk appetite.

D.  

It helps to mitigate internal and external risk factors.

Discussion 0
Questions 136

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

Options:

A.  

Average time to implement patches after vendor release

B.  

Number of patches tested prior to deployment

C.  

Increase in the frequency of patches deployed into production

D.  

Percent of patches implemented within established timeframe

Discussion 0
Questions 137

An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?

Options:

A.  

Lack of cross-functional risk assessment workshops within the organization

B.  

Lack of common understanding of the organization's risk culture

C.  

Lack of quantitative methods to aggregate the total risk exposure

D.  

Lack of an integrated risk management system to aggregate risk scenarios

Discussion 0
Questions 138

Which of the following methods is an example of risk mitigation?

Options:

A.  

Not providing capability for employees to work remotely

B.  

Outsourcing the IT activities and infrastructure

C.  

Enforcing change and configuration management processes

D.  

Taking out insurance coverage for IT-related incidents

Discussion 0
Questions 139

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

Options:

A.  

accounts without documented approval

B.  

user accounts with default passwords

C.  

active accounts belonging to former personnel

D.  

accounts with dormant activity.

Discussion 0
Questions 140

An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?

Options:

A.  

Lead auditor

B.  

Project manager

C.  

Chief audit executive (CAE)

D.  

Chief information officer (CIO)

Discussion 0
Questions 141

The risk appetite for an organization could be derived from which of the following?

Options:

A.  

Cost of controls

B.  

Annual loss expectancy (ALE)

C.  

Inherent risk

D.  

Residual risk

Discussion 0
Questions 142

What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?

Options:

A.  

Aggregated risk may exceed the enterprise's risk appetite and tolerance.

B.  

Duplicate resources may be used to manage risk registers.

C.  

Standardization of risk management practices may be difficult to enforce.

D.  

Risk analysis may be inconsistent due to non-uniform impact and likelihood scales.

Discussion 0
Questions 143

Which of the following is the BEST indicator of an effective IT security awareness program?

Options:

A.  

Decreased success rate of internal phishing tests

B.  

Decreased number of reported security incidents

C.  

Number of disciplinary actions issued for security violations

D.  

Number of employees that complete security training

Discussion 0
Questions 144

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?

Options:

A.  

Monitor the databases for abnormal activity

B.  

Approve exception to allow the software to continue operating

C.  

Require the software vendor to remediate the vulnerabilities

D.  

Accept the risk and let the vendor run the software as is

Discussion 0
Questions 145

Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?

Options:

A.  

Cost-benefit analysis

B.  

Penetration testing

C.  

Business impact analysis (BIA)

D.  

Security assessment

Discussion 0
Questions 146

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

Options:

A.  

Verify authorization by senior management.

B.  

Increase the risk appetite to align with the current risk level

C.  

Ensure the acceptance is set to expire over lime

D.  

Update the risk response in the risk register.

Discussion 0
Questions 147

The purpose of requiring source code escrow in a contractual agreement is to:

Options:

A.  

ensure that the source code is valid and exists.

B.  

ensure that the source code is available if the vendor ceases to exist.

C.  

review the source code for adequacy of controls.

D.  

ensure the source code is available when bugs occur.

Discussion 0
Questions 148

A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

Options:

A.  

a root cause analysis is required

B.  

controls are effective for ensuring continuity

C.  

hardware needs to be upgraded

D.  

no action is required as there was no impact

Discussion 0
Questions 149

Which of the following statements BEST illustrates the relationship between key performance indicators (KPIs) and key control indicators (KCIs)?

Options:

A.  

KPIs measure manual controls, while KCIs measure automated controls.

B.  

KPIs and KCIs both contribute to understanding of control effectiveness.

C.  

A robust KCI program will replace the need to measure KPIs.

D.  

KCIs are applied at the operational level while KPIs are at the strategic level.

Discussion 0
Questions 150

Which of the following should be the MOST important consideration when performing a vendor risk assessment?

Options:

A.  

Results of the last risk assessment of the vendor

B.  

Inherent risk of the business process supported by the vendor

C.  

Risk tolerance of the vendor

D.  

Length of time since the last risk assessment of the vendor

Discussion 0
Questions 151

Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?

Options:

A.  

Key audit findings

B.  

Treatment plan status

C.  

Performance indicators

D.  

Risk scenario results

Discussion 0
Questions 152

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

Options:

A.  

Identifying critical information assets

B.  

Identifying events impacting continuity of operations.

C.  

Creating a data classification scheme

D.  

Analyzing previous risk assessment results

Discussion 0
Questions 153

Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?

Options:

A.  

Increased time to remediate vulnerabilities

B.  

Inaccurate reporting of results

C.  

Increased number of vulnerabilities

D.  

Network performance degradation

Discussion 0
Questions 154

Which of the following is the BEST way to ensure ongoing control effectiveness?

Options:

A.  

Establishing policies and procedures

B.  

Periodically reviewing control design

C.  

Measuring trends in control performance

D.  

Obtaining management control attestations

Discussion 0
Questions 155

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

Options:

A.  

Monitoring

B.  

Analysis

C.  

Identification

D.  

Response selection

Discussion 0
Questions 156

Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?

Options:

A.  

Change testing schedule

B.  

Impact assessment of the change

C.  

Change communication plan

D.  

User acceptance testing (UAT)

Discussion 0
Questions 157

The MOST important objective of information security controls is to:

Options:

A.  

Identify threats and vulnerability

B.  

Ensure alignment with industry standards

C.  

Provide measurable risk reduction

D.  

Enforce strong security solutions

Discussion 0
Questions 158

Which of the following is MOST important to sustainable development of secure IT services?

Options:

A.  

Security training for systems development staff

B.  

\Well-documented business cases

C.  

Security architecture principles

D.  

Secure coding practices

Discussion 0
Questions 159

A trusted third-party service provider has determined that the risk of a client's systems being hacked is low. Which of the following would be the client's BEST course of action?

Options:

A.  

Perform their own risk assessment

B.  

Implement additional controls to address the risk.

C.  

Accept the risk based on the third party's risk assessment

D.  

Perform an independent audit of the third party.

Discussion 0
Questions 160

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

Options:

A.  

Periodic user privileges review

B.  

Log monitoring

C.  

Periodic internal audits

D.  

Segregation of duties

Discussion 0
Questions 161

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

Options:

A.  

Identifying tweets that may compromise enterprise architecture (EA)

B.  

Including diverse Business scenarios in user acceptance testing (UAT)

C.  

Performing risk assessments during the business case development stage

D.  

Including key stakeholders in review of user requirements

Discussion 0
Questions 162

During testing, a risk practitioner finds the IT department's recovery time objective (RTO) for a key system does not align with the enterprise's business continuity plan (BCP). Which of the following should be done NEXT?

Options:

A.  

Report the gap to senior management

B.  

Consult with the IT department to update the RTO

C.  

Complete a risk exception form.

D.  

Consult with the business owner to update the BCP

Discussion 0
Questions 163

Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?

Options:

A.  

Ensuring processes are documented to enable effective control execution

B.  

Ensuring regular risk messaging is Included in business communications from leadership

C.  

Ensuring schedules and deadlines for control-related deliverables are strictly monitored

D.  

Ensuring performance metrics balance business goals with risk appetite

Discussion 0
Questions 164

Prudent business practice requires that risk appetite not exceed:

Options:

A.  

inherent risk.

B.  

risk tolerance.

C.  

risk capacity.

D.  

residual risk.

Discussion 0
Questions 165

During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?

Options:

A.  

Review the cost-benefit of mitigating controls

B.  

Mark the risk status as unresolved within the risk register

C.  

Verify the sufficiency of mitigating controls with the risk owner

D.  

Update the risk register with implemented mitigating actions

Discussion 0
Questions 166

Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?

Options:

A.  

Tokenized personal data only in test environments

B.  

Data loss prevention tools (DLP) installed in passive mode

C.  

Anonymized personal data in non-production environments

D.  

Multi-factor authentication for access to non-production environments

Discussion 0
Questions 167

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

Options:

A.  

Risk tolerance

B.  

Risk appetite

C.  

Risk awareness

D.  

Risk policy

Discussion 0
Questions 168

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

Options:

A.  

Absorb the loss in productivity.

B.  

Request a waiver to the requirements.

C.  

Escalate the issue to senior management

D.  

Remove the control to accommodate business objectives.

Discussion 0
Questions 169

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

Options:

A.  

risk appetite.

B.  

security policies

C.  

process maps.

D.  

risk tolerance level

Discussion 0
Questions 170

A risk practitioner has reviewed new international regulations and realizes the new regulations will affect the organization. Which of the following should be the risk practitioner's NEXT course of

action?

Options:

A.  

Conduct a peer response assessment.

B.  

Update risk scenarios in the risk register.

C.  

Reevaluate the risk management program.

D.  

Ensure applications are compliant.

Discussion 0
Questions 171

Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?

Options:

A.  

The policy lacks specifics on how to secure the organization's systems from cyberattacks.

B.  

The policy has gaps against relevant cybersecurity standards and frameworks.

C.  

The policy has not been reviewed by the cybersecurity team in over a year.

D.  

The policy has not been approved by the organization's board.

Discussion 0
Questions 172

A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner

recommend be done NEXT?

Options:

A.  

Implement targeted awareness training for new BYOD users.

B.  

Implement monitoring to detect control deterioration.

C.  

Identify log sources to monitor BYOD usage and risk impact.

D.  

Reduce the risk tolerance level.

Discussion 0
Questions 173

Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?

Options:

A.  

Aligning business unit risk responses to organizational priorities

B.  

Determining attack likelihood per business unit

C.  

Adjusting business unit risk tolerances

D.  

Customizing incident response plans for each business unit

Discussion 0
Questions 174

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

Options:

A.  

Control effectiveness

B.  

Risk appetite

C.  

Risk likelihood

D.  

Key risk indicator (KRI)

Discussion 0
Questions 175

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

Options:

A.  

Complete an offsite business continuity exercise.

B.  

Conduct a compliance check against standards.

C.  

Perform a vulnerability assessment.

D.  

Measure the change in inherent risk.

Discussion 0
Questions 176

IT risk assessments can BEST be used by management:

Options:

A.  

for compliance with laws and regulations

B.  

as a basis for cost-benefit analysis.

C.  

as input for decision-making

D.  

to measure organizational success.

Discussion 0
Questions 177

An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:

Options:

A.  

a recognized industry control framework

B.  

guidance provided by the external auditor

C.  

the service provider's existing controls

D.  

The organization's specific control requirements

Discussion 0
Questions 178

What are the MOST essential attributes of an effective Key control indicator (KCI)?

Options:

A.  

Flexibility and adaptability

B.  

Measurability and consistency

C.  

Robustness and resilience

D.  

Optimal cost and benefit

Discussion 0
Questions 179

An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?

Options:

A.  

Data minimization

B.  

Accountability

C.  

Accuracy

D.  

Purpose limitation

Discussion 0
Questions 180

Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?

Options:

A.  

Adherence to legal and compliance requirements

B.  

Reduction in the number of test cases in the acceptance phase

C.  

Establishment of digital forensic architectures

D.  

Consistent management of information assets

Discussion 0
Questions 181

Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?

Options:

A.  

Data encryption has not been applied to all sensitive data across the organization.

B.  

There are many data assets across the organization that need to be classified.

C.  

Changes to information handling procedures are not documented.

D.  

Changes to data sensitivity during the data life cycle have not been considered.

Discussion 0
Questions 182

Who is responsible for IT security controls that are outsourced to an external service provider?

Options:

A.  

Organization's information security manager

B.  

Organization's risk function

C.  

Service provider's IT management

D.  

Service provider's information security manager

Discussion 0
Questions 183

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

Options:

A.  

ensuring controls are operating efficiently and facilitating productivity.

B.  

enabling senior leadership to better understand the level of risk the organization is facing.

C.  

monitoring changes in the likelihood of adverse events due to ineffective controls.

D.  

providing information on the degree to which controls are meeting intended objectives.

Discussion 0
Questions 184

Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?

Options:

A.  

Regulatory compliance

B.  

Risk ownership

C.  

Best practices

D.  

Desired risk level

Discussion 0
Questions 185

A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?

Options:

A.  

A post-implementation review has been conducted by key personnel.

B.  

A qualified independent party assessed the new controls as effective.

C.  

Senior management has signed off on the design of the controls.

D.  

Robots have operated without human interference on a daily basis.

Discussion 0
Questions 186

A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?

Options:

A.  

Consistent forms to document risk acceptance rationales

B.  

Acceptable scenarios to override risk appetite or tolerance thresholds

C.  

Individuals or roles authorized to approve risk acceptance

D.  

Communication protocols when a risk is accepted

Discussion 0
Questions 187

An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?

Options:

A.  

Meet with the business leaders to ensure the classification of their transferred data is in place

B.  

Ensure the language in the contract explicitly states who is accountable for each step of the data transfer process

C.  

Collect requirements for the environment to ensure the infrastructure as a service (IaaS) is configured appropriately.

D.  

Work closely with the information security officer to ensure the company has the proper security controls in place.

Discussion 0
Questions 188

Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?

Options:

A.  

Updating multi-factor authentication

B.  

Monitoring key access control performance indicators

C.  

Analyzing access control logs for suspicious activity

D.  

Revising the service level agreement (SLA)

Discussion 0
Questions 189

Mapping open risk issues to an enterprise risk heat map BEST facilitates:

Options:

A.  

risk response.

B.  

control monitoring.

C.  

risk identification.

D.  

risk ownership.

Discussion 0
Questions 190

Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?

Options:

A.  

Threat to IT

B.  

Number of control failures

C.  

Impact on business

D.  

Risk ownership

Discussion 0
Questions 191

Which of the following is the BEST approach for selecting controls to minimize risk?

Options:

A.  

Industry best practice review

B.  

Risk assessment

C.  

Cost-benefit analysis

D.  

Control-effectiveness evaluation

Discussion 0
Questions 192

Which of the following provides the BEST evidence that risk responses are effective?

Options:

A.  

Residual risk is within risk tolerance.

B.  

Risk with low impact is accepted.

C.  

Risk ownership is identified and assigned.

D.  

Compliance breaches are addressed in a timely manner.

Discussion 0
Questions 193

Which of the following activities should only be performed by the third line of defense?

Options:

A.  

Operating controls for risk mitigation

B.  

Testing the effectiveness and efficiency of internal controls

C.  

Providing assurance on risk management processes

D.  

Recommending risk treatment options

Discussion 0
Questions 194

Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?

Options:

A.  

A centralized computer security response team

B.  

Regular performance reviews and management check-ins

C.  

Code of ethics training for all employees

D.  

Communication of employee activity monitoring

Discussion 0
Questions 195

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

Options:

A.  

To support regulatory requirements

B.  

To prevent the risk scenario in the current environment

C.  

To monitor for potential changes to the risk scenario

D.  

To track historical risk assessment results

Discussion 0
Questions 196

Which of the following attributes of a key risk indicator (KRI) is MOST important?

Options:

A.  

Repeatable

B.  

Automated

C.  

Quantitative

D.  

Qualitative

Discussion 0
Questions 197

Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?

Options:

A.  

Standards-based policies

B.  

Audit readiness

C.  

Efficient operations

D.  

Regulatory compliance

Discussion 0
Questions 198

Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?

Options:

A.  

Cost and benefit

B.  

Security and availability

C.  

Maintainability and reliability

D.  

Performance and productivity

Discussion 0
Questions 199

Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?

Options:

A.  

Reassessing control effectiveness of the process

B.  

Conducting a post-implementation review to determine lessons learned

C.  

Reporting key performance indicators (KPIs) for core processes

D.  

Establishing escalation procedures for anomaly events

Discussion 0
Questions 200

A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?

Options:

A.  

Update the KRI threshold.

B.  

Recommend additional controls.

C.  

Review incident handling procedures.

D.  

Perform a root cause analysis.

Discussion 0
Questions 201

Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?

Options:

A.  

Data classification policy

B.  

Emerging technology trends

C.  

The IT strategic plan

D.  

The risk register

Discussion 0
Questions 202

Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?

Options:

A.  

Cause-and-effect diagram

B.  

Delphi technique

C.  

Bottom-up approach

D.  

Top-down approach

Discussion 0
Questions 203

Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?

Options:

A.  

The organization may not have a sufficient number of skilled resources.

B.  

Application and data migration cost for backups may exceed budget.

C.  

Data may not be recoverable due to system failures.

D.  

The database system may not be scalable in the future.

Discussion 0
Questions 204

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

Options:

A.  

Risk and control ownership

B.  

Senior management participation

C.  

Business unit support

D.  

Risk nomenclature and taxonomy

Discussion 0
Questions 205

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

Options:

A.  

Using an aggregated view of organizational risk

B.  

Ensuring relevance to organizational goals

C.  

Relying on key risk indicator (KRI) data Including

D.  

Trend analysis of risk metrics

Discussion 0
Questions 206

When determining risk ownership, the MAIN consideration should be:

Options:

A.  

who owns the business process.

B.  

the amount of residual risk.

C.  

who is responsible for risk mitigation.

D.  

the total cost of risk treatment.

Discussion 0
Questions 207

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

Options:

A.  

Percentage of projects with key risk accepted by the project steering committee

B.  

Reduction in risk policy noncompliance findings

C.  

Percentage of projects with developed controls on scope creep

D.  

Reduction in audits involving external risk consultants

Discussion 0
Questions 208

Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?

Options:

A.  

Financial risk is given a higher priority.

B.  

Risk with strategic impact is included.

C.  

Security strategy is given a higher priority.

D.  

Risk identified by industry benchmarking is included.

Discussion 0
Questions 209

A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?

Options:

A.  

Monitoring of service costs

B.  

Provision of internal audit reports

C.  

Notification of sub-contracting arrangements

D.  

Confidentiality of customer data

Discussion 0
Questions 210

Which of the following is MOST important information to review when developing plans for using emerging technologies?

Options:

A.  

Existing IT environment

B.  

IT strategic plan

C.  

Risk register

D.  

Organizational strategic plan

Discussion 0
Questions 211

Which of the following is MOST important to update when an organization's risk appetite changes?

Options:

A.  

Key risk indicators (KRIs)

B.  

Risk reporting methodology

C.  

Key performance indicators (KPIs)

D.  

Risk taxonomy

Discussion 0
Questions 212

An organization practices the principle of least privilege. To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:

Options:

A.  

business purpose documentation and software license counts

B.  

an access control matrix and approval from the user's manager

C.  

documentation indicating the intended users of the application

D.  

security logs to determine the cause of invalid login attempts

Discussion 0
Questions 213

Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?

Options:

A.  

Maintain and review the classified data inventor.

B.  

Implement mandatory encryption on data

C.  

Conduct an awareness program for data owners and users.

D.  

Define and implement a data classification policy

Discussion 0
Questions 214

Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?

Options:

A.  

Business impact analysis (BIA) results

B.  

Risk scenario ownership

C.  

Risk thresholds

D.  

Possible causes of materialized risk

Discussion 0
Questions 215

Which of the following should be determined FIRST when a new security vulnerability is made public?

Options:

A.  

Whether the affected technology is used within the organization

B.  

Whether the affected technology is Internet-facing

C.  

What mitigating controls are currently in place

D.  

How pervasive the vulnerability is within the organization

Discussion 0
Questions 216

Which of the following would be of GREATEST concern regarding an organization's asset management?

Options:

A.  

Lack of a mature records management program

B.  

Lack of a dedicated asset management team

C.  

Decentralized asset lists

D.  

Incomplete asset inventory

Discussion 0
Questions 217

An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?

Options:

A.  

Redesign the heat map.

B.  

Review the risk tolerance.

C.  

Perform a business impact analysis (BIA)

D.  

Update the risk register.

Discussion 0
Questions 218

Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?

Options:

A.  

Percentage of IT systems recovered within the mean time to restore (MTTR) during the disaster recovery test

B.  

Percentage of issues arising from the disaster recovery test resolved on time

C.  

Percentage of IT systems included in the disaster recovery test scope

D.  

Percentage of IT systems meeting the recovery time objective (RTO) during the disaster recovery test

Discussion 0
Questions 219

Which of the following is the BEST indication of an effective risk management program?

Options:

A.  

Risk action plans are approved by senior management.

B.  

Residual risk is within the organizational risk appetite

C.  

Mitigating controls are designed and implemented.

D.  

Risk is recorded and tracked in the risk register

Discussion 0
Questions 220

An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?

Options:

A.  

The controls may not be properly tested

B.  

The vendor will not ensure against control failure

C.  

The vendor will not achieve best practices

D.  

Lack of a risk-based approach to access control

Discussion 0
Questions 221

Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?

Options:

A.  

Obtain objective assessment of the control environment.

B.  

Ensure the risk profile is defined and communicated.

C.  

Validate the threat management process.

D.  

Obtain an objective view of process gaps and systemic errors.

Discussion 0
Questions 222

Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?

Options:

A.  

An internal audit

B.  

A heat map

C.  

A business impact analysis (BIA)

D.  

A vulnerability report

Discussion 0
Questions 223

The GREATEST concern when maintaining a risk register is that:

Options:

A.  

impacts are recorded in qualitative terms.

B.  

executive management does not perform periodic reviews.

C.  

IT risk is not linked with IT assets.

D.  

significant changes in risk factors are excluded.

Discussion 0
Questions 224

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

Options:

A.  

To deliver projects on time and on budget

B.  

To assess inherent risk

C.  

To include project risk in the enterprise-wide IT risk profit.

D.  

To assess risk throughout the project

Discussion 0
Questions 225

The FIRST task when developing a business continuity plan should be to:

Options:

A.  

determine data backup and recovery availability at an alternate site.

B.  

identify critical business functions and resources.

C.  

define roles and responsibilities for implementation.

D.  

identify recovery time objectives (RTOs) for critical business applications.

Discussion 0
Questions 226

Which of the following will BEST help to improve an organization's risk culture?

Options:

A.  

Maintaining a documented risk register

B.  

Establishing a risk awareness program

C.  

Rewarding employees for reporting security incidents

D.  

Allocating resources for risk remediation

Discussion 0
Questions 227

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

Options:

A.  

Data controllers

B.  

Data processors

C.  

Data custodians

D.  

Data owners

Discussion 0
Questions 228

To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?

Options:

A.  

business owner

B.  

IT department

C.  

Risk manager

D.  

Third-party provider

Discussion 0
Questions 229

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

Options:

A.  

The program has not decreased threat counts.

B.  

The program has not considered business impact.

C.  

The program has been significantly revised

D.  

The program uses non-customized training modules.

Discussion 0
Questions 230

Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?

Options:

A.  

Reviewing the organization's policies and procedures

B.  

Interviewing groups of key stakeholders

C.  

Circulating questionnaires to key internal stakeholders

D.  

Accepting IT personnel s view of business issues

Discussion 0
Questions 231

Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?

Options:

A.  

Perform a business case analysis

B.  

Implement compensating controls.

C.  

Conduct a control sell-assessment (CSA)

D.  

Build a provision for risk

Discussion 0
Questions 232

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

Options:

A.  

Risk likelihood

B.  

Inherent risk

C.  

Risk appetite

D.  

Risk tolerance

Discussion 0
Questions 233

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

Options:

A.  

Conduct risk classification for associated IT controls.

B.  

Determine whether risk responses still effectively address risk.

C.  

Perform vulnerability and threat assessments.

D.  

Analyze and update IT control assessments.

Discussion 0
Questions 234

An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?

Options:

A.  

Evaluate the organization's existing data protection controls.

B.  

Reassess the risk appetite and tolerance levels of the business.

C.  

Evaluate the sensitivity of data that the business needs to handle.

D.  

Review the organization’s data retention policy and regulatory requirements.

Discussion 0
Questions 235

Which of the following is a KEY consideration for a risk practitioner to communicate to senior management evaluating the introduction of artificial intelligence (Al) solutions into the organization?

Options:

A.  

Al requires entirely new risk management processes.

B.  

Al potentially introduces new types of risk.

C.  

Al will result in changes to business processes.

D.  

Third-party Al solutions increase regulatory obligations.

Discussion 0
Questions 236

An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?

Options:

A.  

Business benefits of shadow IT

B.  

Application-related expresses

C.  

Classification of the data

D.  

Volume of data

Discussion 0
Questions 237

Which of the following is the MOST important consideration for effectively maintaining a risk register?

Options:

A.  

An IT owner is assigned for each risk scenario.

B.  

The register is updated frequently.

C.  

The register is shared with executive management.

D.  

Compensating controls are identified.

Discussion 0
Questions 238

Which of the following is the MOST significant indicator of the need to perform a penetration test?

Options:

A.  

An increase in the number of high-risk audit findings

B.  

An increase in the number of security incidents

C.  

An increase in the percentage of turnover in IT personnel

D.  

An increase in the number of infrastructure changes

Discussion 0
Questions 239

The PRIMARY reason for communicating risk assessment results to data owners is to enable the:

Options:

A.  

design of appropriate controls.

B.  

industry benchmarking of controls.

C.  

prioritization of response efforts.

D.  

classification of information assets.

Discussion 0
Questions 240

Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?

Options:

A.  

Some critical business applications are not included in the plan

B.  

Several recovery activities will be outsourced

C.  

The plan is not based on an internationally recognized framework

D.  

The chief information security officer (CISO) has not approved the plan

Discussion 0
Questions 241

Which of the following is the FIRST step in risk assessment?

Options:

A.  

Review risk governance

B.  

Asset identification

C.  

Identify risk factors

D.  

Inherent risk identification

Discussion 0
Questions 242

Which of the following BEST facilitates the mitigation of identified gaps between current and desired risk environment states?

Options:

A.  

Develop a risk treatment plan.

B.  

Validate organizational risk appetite.

C.  

Review results of prior risk assessments.

D.  

Include the current and desired states in the risk register.

Discussion 0
Questions 243

Who should be accountable for authorizing information system access to internal users?

Options:

A.  

Information security officer

B.  

Information security manager

C.  

Information custodian

D.  

Information owner

Discussion 0
Questions 244

Who is PRIMARILY accountable for risk treatment decisions?

Options:

A.  

Risk owner

B.  

Business manager

C.  

Data owner

D.  

Risk manager

Discussion 0
Questions 245

Which of the following provides the MOST important information to facilitate a risk response decision?

Options:

A.  

Audit findings

B.  

Risk appetite

C.  

Key risk indicators

D.  

Industry best practices

Discussion 0
Questions 246

Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?

Options:

A.  

Management has not determined a final implementation date.

B.  

Management has not completed an early mitigation milestone.

C.  

Management has not secured resources for mitigation activities.

D.  

Management has not begun the implementation.

Discussion 0
Questions 247

Who is accountable for risk treatment?

Options:

A.  

Enterprise risk management team

B.  

Risk mitigation manager

C.  

Business process owner

D.  

Risk owner

Discussion 0
Questions 248

Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?

Options:

A.  

Improved senior management communication

B.  

Optimized risk treatment decisions

C.  

Enhanced awareness of risk management

D.  

Improved collaboration among risk professionals

Discussion 0
Questions 249

Which of the following is the GREATEST risk associated with the misclassification of data?

Options:

A.  

inadequate resource allocation

B.  

Data disruption

C.  

Unauthorized access

D.  

Inadequate retention schedules

Discussion 0
Questions 250

Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?

Options:

A.  

A comparison of the costs of notice and consent control options

B.  

Examples of regulatory fines incurred by industry peers for noncompliance

C.  

A report of critical controls showing the importance of notice and consent

D.  

A cost-benefit analysis of the control versus probable legal action

Discussion 0
Questions 251

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

Options:

A.  

Key risk indicators (KRls)

B.  

Inherent risk

C.  

Residual risk

D.  

Risk appetite

Discussion 0
Questions 252

Which of the following is the MOST important component in a risk treatment plan?

Options:

A.  

Technical details

B.  

Target completion date

C.  

Treatment plan ownership

D.  

Treatment plan justification

Discussion 0
Questions 253

Which of the following activities is PRIMARILY the responsibility of senior management?

Options:

A.  

Bottom-up identification of emerging risks

B.  

Categorization of risk scenarios against a standard taxonomy

C.  

Prioritization of risk scenarios based on severity

D.  

Review of external loss data

Discussion 0
Questions 254

Which of the following is the MOST important benefit of reporting risk assessment results to senior management?

Options:

A.  

Promotion of a risk-aware culture

B.  

Compilation of a comprehensive risk register

C.  

Alignment of business activities

D.  

Facilitation of risk-aware decision making

Discussion 0
Questions 255

An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?

Options:

A.  

Variances in recovery times

B.  

Ownership assignment for controls

C.  

New potentially disruptive scenarios

D.  

Contractual changes with customers

Discussion 0
Questions 256

An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?

Options:

A.  

The service provider

B.  

Vendor risk manager

C.  

Legal counsel

D.  

Business process owner

Discussion 0
Questions 257

The BEST reason to classify IT assets during a risk assessment is to determine the:

Options:

A.  

priority in the risk register.

B.  

business process owner.

C.  

enterprise risk profile.

D.  

appropriate level of protection.

Discussion 0
Questions 258

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

Options:

A.  

Balanced scorecard

B.  

Risk appetite

C.  

Risk map

D.  

Risk events

Discussion 0
Questions 259

Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

Options:

A.  

Data duplication processes

B.  

Data archival processes

C.  

Data anonymization processes

D.  

Data protection processes

Discussion 0
Questions 260

Which of the following is the MOST important consideration when prioritizing risk response?

Options:

A.  

Requirements for regulatory obligations.

B.  

Cost of control implementation.

C.  

Effectiveness of risk treatment.

D.  

Number of risk response options.

Discussion 0
Questions 261

Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?

Options:

A.  

Results of current and past risk assessments

B.  

Organizational strategy and objectives

C.  

Lessons learned from materialized risk scenarios

D.  

Internal and external audit findings

Discussion 0
Questions 262

Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?

Options:

A.  

Building an organizational risk profile after updating the risk register

B.  

Ensuring risk owners participate in a periodic control testing process

C.  

Designing a process for risk owners to periodically review identified risk

D.  

Implementing a process for ongoing monitoring of control effectiveness

Discussion 0
Questions 263

Which of the following would MOST likely result in updates to an IT risk appetite statement?

Options:

A.  

External audit findings

B.  

Feedback from focus groups

C.  

Self-assessment reports

D.  

Changes in senior management

Discussion 0
Questions 264

Which organizational role should be accountable for ensuring information assets are appropriately classified?

Options:

A.  

Data protection officer

B.  

Chief information officer (CIO)

C.  

Information asset custodian

D.  

Information asset owner

Discussion 0
Questions 265

Which of the following should be the PRIMARY input to determine risk tolerance?

Options:

A.  

Regulatory requirements

B.  

Organizational objectives

C.  

Annual loss expectancy (ALE)

D.  

Risk management costs

Discussion 0
Questions 266

The PRIMARY advantage of involving end users in continuity planning is that they:

Options:

A.  

have a better understanding of specific business needs

B.  

can balance the overall technical and business concerns

C.  

can see the overall impact to the business

D.  

are more objective than information security management.

Discussion 0
Questions 267

Risk mitigation procedures should include:

Options:

A.  

buying an insurance policy.

B.  

acceptance of exposures

C.  

deployment of counter measures.

D.  

enterprise architecture implementation.

Discussion 0
Questions 268

Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?

Options:

A.  

It facilitates the use of a framework for risk management.

B.  

It establishes a means for senior management to formally approve risk practices.

C.  

It encourages risk-based decision making for stakeholders.

D.  

It provides a basis for benchmarking against industry standards.

Discussion 0
Questions 269

Which of the following is the GREATEST concern related to the monitoring of key risk indicators (KRIs)?

Options:

A.  

Logs are retained for longer than required.

B.  

Logs are reviewed annually.

C.  

Logs are stored in a multi-tenant cloud environment.

D.  

Logs are modified before analysis is conducted.

Discussion 0
Questions 270

Which of the following roles would provide the MOST important input when identifying IT risk scenarios?

Options:

A.  

Information security managers

B.  

Internal auditors

C.  

Business process owners

D.  

Operational risk managers

Discussion 0
Questions 271

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

Options:

A.  

The team that performed the risk assessment

B.  

An assigned risk manager to provide oversight

C.  

Action plans to address risk scenarios requiring treatment

D.  

The methodology used to perform the risk assessment

Discussion 0
Questions 272

Calculation of the recovery time objective (RTO) is necessary to determine the:

Options:

A.  

time required to restore files.

B.  

point of synchronization

C.  

priority of restoration.

D.  

annual loss expectancy (ALE).

Discussion 0
Questions 273

Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?

Options:

A.  

Risk management

B.  

Business units

C.  

External audit

D.  

Internal audit

Discussion 0
Questions 274

Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?

Options:

A.  

Risk maturity

B.  

Risk policy

C.  

Risk appetite

D.  

Risk culture

Discussion 0
Questions 275

Which of the following is the PRIMARY benefit of implementing key control indicators (KCIs)?

Options:

A.  

Confirming the adequacy of recovery plans.

B.  

Improving compliance with control standards.

C.  

Providing early detection of control degradation.

D.  

Reducing the number of incidents.

Discussion 0
Questions 276

What is senior management's role in the RACI model when tasked with reviewing monthly status reports provided by risk owners?

Options:

A.  

Accountable

B.  

Informed

C.  

Responsible

D.  

Consulted

Discussion 0
Questions 277

Which of the following is MOST important for a risk practitioner to confirm once a risk action plan has been completed?

Options:

A.  

The risk register has been updated.

B.  

The risk tolerance has been recalibrated.

C.  

The risk has been mitigated to the intended level.

D.  

The risk owner has reviewed the outcomes.

Discussion 0
Questions 278

Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?

Options:

A.  

Testing is completed in phases, with user testing scheduled as the final phase.

B.  

Segregation of duties controls are overridden during user testing phases.

C.  

Data anonymization is used during all cycles of end-user testing.

D.  

Testing is completed by IT support users without input from end users.

Discussion 0
Questions 279

Which of the following scenarios is MOST important to communicate to senior management?

Options:

A.  

Accepted risk scenarios with detailed plans for monitoring

B.  

Risk scenarios that have been shared with vendors and third parties

C.  

Accepted risk scenarios with impact exceeding the risk tolerance

D.  

Risk scenarios that have been identified, assessed, and responded to by the risk owners

Discussion 0
Questions 280

Which of the following is the BEST control to minimize the risk associated with scope creep in software development?

Options:

A.  

An established process for project change management

B.  

Retention of test data and results for review purposes

C.  

Business managements review of functional requirements

D.  

Segregation between development, test, and production

Discussion 0
Questions 281

Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?

Options:

A.  

Adopting qualitative enterprise risk assessment methods

B.  

Linking IT risk scenarios to technology objectives

C.  

linking IT risk scenarios to enterprise strategy

D.  

Adopting quantitative enterprise risk assessment methods

Discussion 0
Questions 282

Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?

Options:

A.  

Conduct penetration testing.

B.  

Interview IT operations personnel.

C.  

Conduct vulnerability scans.

D.  

Review change control board documentation.

Discussion 0
Questions 283

Which of the following is MOST useful for measuring the existing risk management process against a desired state?

Options:

A.  

Balanced scorecard

B.  

Risk management framework

C.  

Capability maturity model

D.  

Risk scenario analysis

Discussion 0
Questions 284

An organization's risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?

Options:

A.  

Analyzing the residual risk components

B.  

Performing risk prioritization

C.  

Validating the risk appetite level

D.  

Conducting a risk assessment

Discussion 0
Questions 285

Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?

Options:

A.  

Mean time to recover (MTTR)

B.  

IT system criticality classification

C.  

Incident management service level agreement (SLA)

D.  

Recovery time objective (RTO)

Discussion 0
Questions 286

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

Options:

A.  

A record of incidents is maintained.

B.  

Forensic investigations are facilitated.

C.  

Security violations can be identified.

D.  

Developing threats are detected earlier.

Discussion 0
Questions 287

Which of the following BEST facilitates the development of effective IT risk scenarios?

Options:

A.  

Utilization of a cross-functional team

B.  

Participation by IT subject matter experts

C.  

Integration of contingency planning

D.  

Validation by senior management

Discussion 0
Questions 288

The software version of an enterprise's critical business application has reached end-of-life and is no longer supported by the vendor. IT has decided to develop an in-house replacement application. Which of the following should be the PRIMARY concern?

Options:

A.  

The system documentation is not available.

B.  

Enterprise risk management (ERM) has not approved the decision.

C.  

The board of directors has not approved the decision.

D.  

The business process owner is not an active participant.

Discussion 0
Questions 289

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?

Options:

A.  

Percentage of vulnerabilities remediated within the agreed service level

B.  

Number of vulnerabilities identified during the period

C.  

Number of vulnerabilities re-opened during the period

D.  

Percentage of vulnerabilities escalated to senior management

Discussion 0
Questions 290

Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

Options:

A.  

An updated risk register

B.  

Risk assessment results

C.  

Technical control validation

D.  

Control testing results

Discussion 0
Questions 291

When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:

Options:

A.  

that results in a full root cause analysis.

B.  

used for verification within the SLA.

C.  

that are verified as actual incidents.

D.  

resolved within the SLA.

Discussion 0
Questions 292

Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?

Options:

A.  

Incident reports

B.  

Cost-benefit analysis

C.  

Risk tolerance

D.  

Control objectives

Discussion 0
Questions 293

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

Options:

A.  

KRIs assist in the preparation of the organization's risk profile.

B.  

KRIs signal that a change in the control environment has occurred.

C.  

KRIs provide a basis to set the risk appetite for an organization

D.  

KRIs provide an early warning that a risk threshold is about to be reached.

Discussion 0
Questions 294

Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?

Options:

A.  

Al may result in less reliance on human intervention.

B.  

Malicious activity may inadvertently be classified as normal during baselining.

C.  

Risk assessments of heuristic security systems are more difficult.

D.  

Predefined patterns of malicious activity may quickly become outdated.

Discussion 0
Questions 295

Which of the following will provide the BEST measure of compliance with IT policies?

Options:

A.  

Evaluate past policy review reports.

B.  

Conduct regular independent reviews.

C.  

Perform penetration testing.

D.  

Test staff on their compliance responsibilities.

Discussion 0
Questions 296

A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?

Options:

A.  

HR training director

B.  

Business process owner

C.  

HR recruitment manager

D.  

Chief information officer (CIO)

Discussion 0
Questions 297

Which of the following BEST facilitates the development of relevant risk scenarios?

Options:

A.  

Perform quantitative risk analysis of historical data.

B.  

Adopt an industry-recognized risk framework.

C.  

Use qualitative risk assessment methodologies.

D.  

Conduct brainstorming sessions with key stakeholders.

Discussion 0
Questions 298

Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?

Options:

A.  

An increase in the number of risk threshold exceptions

B.  

An increase in the number of change events pending management review

C.  

A decrease in the number of key performance indicators (KPIs)

D.  

A decrease in the number of critical assets covered by risk thresholds

Discussion 0
Questions 299

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

Options:

A.  

Review historical application down me and frequency

B.  

Assess the potential impact and cost of mitigation

C.  

identify other legacy systems within the organization

D.  

Explore the feasibility of replacing the legacy system

Discussion 0
Questions 300

An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:

Options:

A.  

reduce the likelihood of future events

B.  

restore availability

C.  

reduce the impact of future events

D.  

address the root cause

Discussion 0
Questions 301

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

Options:

A.  

Classification of the data

B.  

Type of device

C.  

Remote management capabilities

D.  

Volume of data

Discussion 0
Questions 302

Which of the following tasks should be completed prior to creating a disaster recovery plan (DRP)?

Options:

A.  

Conducting a business impact analysis (BIA)

B.  

Identifying the recovery response team

C.  

Procuring a recovery site

D.  

Assigning sensitivity levels to data

Discussion 0
Questions 303

A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?

Options:

A.  

Include an indemnification clause in the provider's contract.

B.  

Monitor provider performance against service level agreements (SLAs).

C.  

Purchase cyber insurance to protect against data breaches.

D.  

Ensure appropriate security controls are in place through independent audits.

Discussion 0
Questions 304

Which of the following is the MOST important reason to communicate risk assessments to senior management?

Options:

A.  

To ensure actions can be taken to align assessment results to risk appetite

B.  

To ensure key risk indicator (KRI) thresholds can be adjusted for tolerance

C.  

To ensure awareness of risk and controls is shared with key decision makers

D.  

To ensure the maturity of the assessment program can be validated

Discussion 0
Questions 305

Which of the following statements BEST describes risk appetite?

Options:

A.  

The amount of risk an organization is willing to accept

B.  

The effective management of risk and internal control environments

C.  

Acceptable variation between risk thresholds and business objectives

D.  

The acceptable variation relative to the achievement of objectives

Discussion 0
Questions 306

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

Options:

A.  

Evaluating gaps in the on-premise and cloud security profiles

B.  

Establishing minimum cloud security requirements

C.  

Enforcing compliance with cloud security parameters

D.  

Educating IT staff on variances between on premise and cloud security

Discussion 0
Questions 307

Risk mitigation is MOST effective when which of the following is optimized?

Options:

A.  

Operational risk

B.  

Residual risk

C.  

Inherent risk

D.  

Regulatory risk

Discussion 0
Questions 308

Which of the following is the BEST way to identify changes in the risk profile of an organization?

Options:

A.  

Monitor key risk indicators (KRIs).

B.  

Monitor key performance indicators (KPIs).

C.  

Interview the risk owner.

D.  

Conduct a gap analysis

Discussion 0
Questions 309

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

Options:

A.  

The head of enterprise architecture (EA)

B.  

The IT risk manager

C.  

The information security manager

D.  

The product owner

Discussion 0
Questions 310

Which of the following should be considered when selecting a risk response?

Options:

A.  

Risk scenarios analysis

B.  

Risk response costs

C.  

Risk factor awareness

D.  

Risk factor identification

Discussion 0
Questions 311

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

Options:

A.  

Conduct social engineering testing.

B.  

Audit security awareness training materials.

C.  

Administer an end-of-training quiz.

D.  

Perform a vulnerability assessment.

Discussion 0
Questions 312

Which of the following is MOST critical to the design of relevant risk scenarios?

Options:

A.  

The scenarios are based on past incidents.

B.  

The scenarios are linked to probable organizational situations.

C.  

The scenarios are mapped to incident management capabilities.

D.  

The scenarios are aligned with risk management capabilities.

Discussion 0
Questions 313

What is a risk practitioner's BEST approach to monitor and measure how quickly an exposure to a specific risk can affect the organization?

Options:

A.  

Create an asset valuation report.

B.  

Create key performance indicators (KPls).

C.  

Create key risk indicators (KRIs).

D.  

Create a risk volatility report.

Discussion 0
Questions 314

Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?

Options:

A.  

Number of users who have signed a BYOD acceptable use policy

B.  

Number of incidents originating from BYOD devices

C.  

Budget allocated to the BYOD program security controls

D.  

Number of devices enrolled in the BYOD program

Discussion 0
Questions 315

IT disaster recovery point objectives (RPOs) should be based on the:

Options:

A.  

maximum tolerable downtime.

B.  

maximum tolerable loss of data.

C.  

need of each business unit.

D.  

type of business.

Discussion 0
Questions 316

Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

Options:

A.  

a gap analysis

B.  

a root cause analysis.

C.  

an impact assessment.

D.  

a vulnerability assessment.

Discussion 0
Questions 317

Which of the following is a KEY outcome of risk ownership?

Options:

A.  

Risk responsibilities are addressed.

B.  

Risk-related information is communicated.

C.  

Risk-oriented tasks are defined.

D.  

Business process risk is analyzed.

Discussion 0
Questions 318

While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?

Options:

A.  

Update the risk register with the average of residual risk for both business units.

B.  

Review the assumptions of both risk scenarios to determine whether the variance is reasonable.

C.  

Update the risk register to ensure both risk scenarios have the highest residual risk.

D.  

Request that both business units conduct another review of the risk.

Discussion 0
Questions 319

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

Options:

A.  

Methods of attack progression

B.  

Losses incurred by industry peers

C.  

Most recent antivirus scan reports

D.  

Potential impact of events

Discussion 0
Questions 320

During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?

Options:

A.  

Risk management framework adopted by each company

B.  

Risk registers of both companies

C.  

IT balanced scorecard of each company

D.  

Most recent internal audit findings from both companies

Discussion 0
Questions 321

The risk associated with an asset after controls are applied can be expressed as:

Options:

A.  

a function of the cost and effectiveness of controls.

B.  

the likelihood of a given threat.

C.  

a function of the likelihood and impact.

D.  

the magnitude of an impact.

Discussion 0
Questions 322

The MAIN reason for prioritizing IT risk responses is to enable an organization to:

Options:

A.  

determine the risk appetite.

B.  

determine the budget.

C.  

define key performance indicators (KPIs).

D.  

optimize resource utilization.

Discussion 0
Questions 323

Which of the following is the BEST evidence that risk management is driving business decisions in an organization?

Options:

A.  

Compliance breaches are addressed in a timely manner.

B.  

Risk ownership is identified and assigned.

C.  

Risk treatment options receive adequate funding.

D.  

Residual risk is within risk tolerance.

Discussion 0
Questions 324

The MOST effective way to increase the likelihood that risk responses will be implemented is to:

Options:

A.  

create an action plan

B.  

assign ownership

C.  

review progress reports

D.  

perform regular audits.

Discussion 0
Questions 325

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

Options:

A.  

Risk appetite is decreased.

B.  

Inherent risk is increased.

C.  

Risk tolerance is decreased.

D.  

Residual risk is increased.

Discussion 0
Questions 326

Which of the following is the MOST important enabler of effective risk management?

Options:

A.  

User awareness of policies and procedures

B.  

Implementation of proper controls

C.  

Senior management support

D.  

Continuous monitoring of threats and vulnerabilities

Discussion 0
Questions 327

The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:

Options:

A.  

rectify errors in results of KRIs.

B.  

detect changes in the risk profile.

C.  

reduce costs of risk mitigation controls.

D.  

continually improve risk assessments.

Discussion 0
Questions 328

Which of the following is MOST important to identify when developing generic risk scenarios?

Options:

A.  

The organization’s vision and mission

B.  

Resources required for risk mitigation

C.  

Impact to business objectives

D.  

Risk-related trends within the industry

Discussion 0
Questions 329

A contract associated with a cloud service provider MUST include:

Options:

A.  

ownership of responsibilities.

B.  

a business recovery plan.

C.  

provision for source code escrow.

D.  

the providers financial statements.

Discussion 0
Questions 330

Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?

Options:

A.  

SWOT analysis

B.  

Business impact analysis (BIA)

C.  

Cost-benefit analysis

D.  

Root cause analysis

Discussion 0
Questions 331

The BEST indication that risk management is effective is when risk has been reduced to meet:

Options:

A.  

risk levels.

B.  

risk budgets.

C.  

risk appetite.

D.  

risk capacity.

Discussion 0
Questions 332

Key risk indicators (KRIs) BEST support risk treatment when they:

Options:

A.  

Set performance expectations for controls.

B.  

Align with key business objectives.

C.  

Indicate that the risk is approaching predefined thresholds.

D.  

Articulate likelihood and impact in quantitative terms.

Discussion 0
Questions 333

The PRIMARY advantage of implementing an IT risk management framework is the:

Options:

A.  

establishment of a reliable basis for risk-aware decision making.

B.  

compliance with relevant legal and regulatory requirements.

C.  

improvement of controls within the organization and minimized losses.

D.  

alignment of business goals with IT objectives.

Discussion 0
Questions 334

Who is ULTIMATELY accountable for risk treatment?

Options:

A.  

Risk owner

B.  

Enterprise risk management (ERM)

C.  

Risk practitioner

D.  

Control owner

Discussion 0
Questions 335

Which of the following would qualify as a key performance indicator (KPI)?

Options:

A.  

Aggregate risk of the organization

B.  

Number of identified system vulnerabilities

C.  

Number of exception requests processed in the past 90 days

D.  

Number of attacks against the organization's website

Discussion 0
Questions 336

Which of the following is the BEST response when a potential IT control deficiency has been identified?

Options:

A.  

Remediate and report the deficiency to the enterprise risk committee.

B.  

Verify the deficiency and then notify the business process owner.

C.  

Verify the deficiency and then notify internal audit.

D.  

Remediate and report the deficiency to senior executive management.

Discussion 0
Questions 337

Which of the following is MOST important to review when determining whether a potential IT service provider’s control environment is effective?

Options:

A.  

Independent audit report

B.  

Control self-assessment

C.  

MOST important to update when an

D.  

Service level agreements (SLAs)

Discussion 0
Questions 338

Before implementing instant messaging within an organization using a public solution, which of the following should be in place to mitigate data leakage risk?

Options:

A.  

A data extraction tool

B.  

An access control list

C.  

An intrusion detection system (IDS)

D.  

An acceptable usage policy

Discussion 0
Questions 339

Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?

Options:

A.  

A management-approved risk dashboard

B.  

A current control framework

C.  

A regularly updated risk register

D.  

Regularly updated risk management procedures

Discussion 0
Questions 340

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

Options:

A.  

Percentage of business users completing risk training

B.  

Percentage of high-risk scenarios for which risk action plans have been developed

C.  

Number of key risk indicators (KRIs) defined

D.  

Time between when IT risk scenarios are identified and the enterprise's response

Discussion 0
Questions 341

Which of the following is MOST important for an organization to have in place when developing a risk management framework?

Options:

A.  

A strategic approach to risk including an established risk appetite

B.  

A risk-based internal audit plan for the organization

C.  

A control function within the risk management team

D.  

An organization-wide risk awareness training program

Discussion 0
Questions 342

An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner's BEST recommendation?

Options:

A.  

Implement database activity and capacity monitoring.

B.  

Ensure the business is aware of the risk.

C.  

Ensure the enterprise has a process to detect such situations.

D.  

Consider providing additional system resources to this job.

Discussion 0
Questions 343

Which of the following would BEST mitigate an identified risk scenario?

Options:

A.  

Conducting awareness training

B.  

Executing a risk response plan

C.  

Establishing an organization's risk tolerance

D.  

Performing periodic audits

Discussion 0
Questions 344

An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

Options:

A.  

Escalate to senior management.

B.  

Identify a risk transfer option.

C.  

Reassess risk scenarios.

D.  

Benchmark with similar industries.

Discussion 0
Questions 345

Which of the following is MOST effective in continuous risk management process improvement?

Options:

A.  

Periodic assessments

B.  

Change management

C.  

Awareness training

D.  

Policy updates

Discussion 0
Questions 346

Which of the following tools is MOST effective in identifying trends in the IT risk profile?

Options:

A.  

Risk self-assessment

B.  

Risk register

C.  

Risk dashboard

D.  

Risk map

Discussion 0
Questions 347

Which of the following is the GREATEST risk associated with an environment that lacks documentation of the architecture?

Options:

A.  

Unknown vulnerabilities

B.  

Legacy technology systems

C.  

Network isolation

D.  

Overlapping threats

Discussion 0
Questions 348

Which of the following indicates an organization follows IT risk management best practice?

Options:

A.  

The risk register template uses an industry standard.

B.  

The risk register is regularly updated.

C.  

All fields in the risk register have been completed.

D.  

Controls are listed against risk entries in the register.

Discussion 0
Questions 349

Which of the following is the BEST source for identifying key control indicators (KCIs)?

Options:

A.  

Privileged user activity monitoring controls

B.  

Controls mapped to organizational risk scenarios

C.  

Recent audit findings of control weaknesses

D.  

A list of critical security processes

Discussion 0
Questions 350

Which of the following is the MOST important responsibility of a risk owner?

Options:

A.  

Testing control design

B.  

Accepting residual risk

C.  

Establishing business information criteria

D.  

Establishing the risk register

Discussion 0
Questions 351

Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?

Options:

A.  

Regional competitors' policies and standards

B.  

Ability to monitor and enforce compliance

C.  

Industry-standard templates

D.  

Differences in regulatory requirements

Discussion 0
Questions 352

An organization is making significant changes to an application. At what point should the application risk profile be updated?

Options:

A.  

After user acceptance testing (UAT)

B.  

Upon release to production

C.  

During backlog scheduling

D.  

When reviewing functional requirements

Discussion 0
Questions 353

An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?

Options:

A.  

Identify systems that are vulnerable to being exploited by the attack.

B.  

Confirm with the antivirus solution vendor whether the next update will detect the attack.

C.  

Verify the data backup process and confirm which backups are the most recent ones available.

D.  

Obtain approval for funding to purchase a cyber insurance plan.

Discussion 0
Questions 354

The MOST important reason for implementing change control procedures is to ensure:

Options:

A.  

only approved changes are implemented

B.  

timely evaluation of change events

C.  

an audit trail exists.

D.  

that emergency changes are logged.

Discussion 0
Questions 355

Which of the following is the PRIMARY objective for automating controls?

Options:

A.  

Reducing the need for audit reviews

B.  

Facilitating continuous control monitoring

C.  

Improving control process efficiency

D.  

Complying with functional requirements

Discussion 0
Questions 356

Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?

Options:

A.  

Establish a cyber response plan

B.  

Implement data loss prevention (DLP) tools.

C.  

Implement network segregation.

D.  

Strengthen vulnerability remediation efforts.

Discussion 0
Questions 357

Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?

Options:

A.  

Single loss expectancy (SLE)

B.  

Cost of the information system

C.  

Availability of additional compensating controls

D.  

Potential business impacts are within acceptable levels

Discussion 0
Questions 358

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

Options:

A.  

Assemble an incident response team.

B.  

Create a disaster recovery plan (DRP).

C.  

Develop a risk response plan.

D.  

Initiate a business impact analysis (BIA).

Discussion 0
Questions 359

Which of the following is the MOST important consideration when developing risk strategies?

Options:

A.  

Organization's industry sector

B.  

Long-term organizational goals

C.  

Concerns of the business process owners

D.  

History of risk events

Discussion 0
Questions 360

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:

Options:

A.  

data classification and labeling.

B.  

data logging and monitoring.

C.  

data retention and destruction.

D.  

data mining and analytics.

Discussion 0
Questions 361

Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''

Options:

A.  

Implement role-based access control

B.  

Implement a data masking process

C.  

Include sanctions in nondisclosure agreements (NDAs)

D.  

Install a data loss prevention (DLP) tool

Discussion 0
Questions 362

An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the countrywhere it is collected. Which of the following should be done FIRST when addressing this situation?

Options:

A.  

Analyze data protection methods.

B.  

Understand data flows.

C.  

Include a right-to-audit clause.

D.  

Implement strong access controls.

Discussion 0
Questions 363

Which of the following is the MOST important consideration when implementing ethical remote work monitoring?

Options:

A.  

Monitoring is only conducted between official hours of business

B.  

Employees are informed of how they are bong monitored

C.  

Reporting on nonproductive employees is sent to management on a scheduled basis

D.  

Multiple data monitoring sources are integrated into security incident response procedures

Discussion 0
Questions 364

After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?

Options:

A.  

Accept the risk with management sign-off.

B.  

Ignore the risk until the regulatory body conducts a compliance check.

C.  

Mitigate the risk with the identified control.

D.  

Transfer the risk by buying insurance.

Discussion 0
Questions 365

A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner's BEST course of action when a compensating control needs to be applied?

Options:

A.  

Obtain the risk owner's approval.

B.  

Record the risk as accepted in the risk register.

C.  

Inform senior management.

D.  

update the risk response plan.

Discussion 0
Questions 366

The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?

Options:

A.  

Escalate to senior management

B.  

Require a nondisclosure agreement.

C.  

Sanitize portions of the register

D.  

Determine the purpose of the request

Discussion 0
Questions 367

Which of the following would BEST help an enterprise prioritize risk scenarios?

Options:

A.  

Industry best practices

B.  

Placement on the risk map

C.  

Degree of variances in the risk

D.  

Cost of risk mitigation

Discussion 0
Questions 368

Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?

Options:

A.  

Exposure of log data

B.  

Lack of governance

C.  

Increased number of firewall rules

D.  

Lack of agreed-upon standards

Discussion 0
Questions 369

What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?

Options:

A.  

Documenting project lessons learned

B.  

Validating the risk mitigation project has been completed

C.  

Confirming that the project budget was not exceeded

D.  

Verifying that the risk level has been lowered

Discussion 0
Questions 370

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

Options:

A.  

risk mitigation approach

B.  

cost-benefit analysis.

C.  

risk assessment results.

D.  

vulnerability assessment results

Discussion 0
Questions 371

All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:

Options:

A.  

select a provider to standardize the disaster recovery plans.

B.  

outsource disaster recovery to an external provider.

C.  

centralize the risk response function at the enterprise level.

D.  

evaluate opportunities to combine disaster recovery plans.

Discussion 0
Questions 372

A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?

Options:

A.  

Use of a non-production environment

B.  

Regular security updates

C.  

Third-party management plan

D.  

Adequate vendor support

Discussion 0
Questions 373

Which of the following controls BEST enables an organization to ensure a complete and accurate IT asset inventory?

Options:

A.  

Prohibiting the use of personal devices for business

B.  

Performing network scanning for unknown devices

C.  

Requesting an asset list from business owners

D.  

Documenting asset configuration baselines

Discussion 0
Questions 374

A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

Options:

A.  

Enable data encryption in the test environment.

B.  

Prevent the use of production data in the test environment

C.  

De-identify data before being transferred to the test environment.

D.  

Enforce multi-factor authentication within the test environment.

Discussion 0
Questions 375

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

Options:

A.  

Segregation of duties

B.  

Three lines of defense

C.  

Compliance review

D.  

Quality assurance review

Discussion 0
Questions 376

Which of the following would BEST facilitate the maintenance of data classification requirements?

Options:

A.  

Scheduling periodic audits

B.  

Assigning a data custodian

C.  

Implementing technical controls over the assets

D.  

Establishing a data loss prevention (DLP) solution

Discussion 0
Questions 377

For a large software development project, risk assessments are MOST effective when performed:

Options:

A.  

before system development begins.

B.  

at system development.

C.  

at each stage of the system development life cycle (SDLC).

D.  

during the development of the business case.

Discussion 0
Questions 378

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

Options:

A.  

Perform a background check on the vendor.

B.  

Require the vendor to sign a nondisclosure agreement.

C.  

Require the vendor to have liability insurance.

D.  

Clearly define the project scope

Discussion 0
Questions 379

Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?

Options:

A.  

Updating the risk register to include the risk mitigation plan

B.  

Determining processes for monitoring the effectiveness of the controls

C.  

Ensuring that control design reduces risk to an acceptable level

D.  

Confirming to management the controls reduce the likelihood of the risk

Discussion 0
Questions 380

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?

Options:

A.  

Network monitoring infrastructure

B.  

Centralized vulnerability management

C.  

Incident management process

D.  

Centralized log management

Discussion 0
Questions 381

Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?

Options:

A.  

Ensuring that database changes are correctly applied

B.  

Enforcing that changes are authorized

C.  

Deterring illicit actions of database administrators

D.  

Preventing system developers from accessing production data

Discussion 0
Questions 382

An insurance company handling sensitive and personal information from its customers receives a large volume of telephone requests and electronic communications daily. Which of the following

is MOST important to include in a risk awareness training session for the customer service department?

Options:

A.  

Archiving sensitive information

B.  

Understanding the incident management process

C.  

Identifying social engineering attacks

D.  

Understanding the importance of using a secure password

Discussion 0
Questions 383

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

Options:

A.  

Change logs

B.  

Change management meeting minutes

C.  

Key control indicators (KCIs)

D.  

Key risk indicators (KRIs)

Discussion 0
Questions 384

Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?

Options:

A.  

The costs associated with mitigation options

B.  

The status of identified risk scenarios

C.  

The cost-benefit analysis of each risk response

D.  

The timeframes for risk response actions

Discussion 0
Questions 385

An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?

Options:

A.  

Risk profile

B.  

Risk capacity

C.  

Risk indicators

D.  

Risk tolerance

Discussion 0
Questions 386

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

Options:

A.  

The value at which control effectiveness would fail

B.  

Thresholds benchmarked to peer organizations

C.  

A typical operational value

D.  

A value that represents the intended control state

Discussion 0
Questions 387

The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:

Options:

A.  

vulnerability scans.

B.  

recurring vulnerabilities.

C.  

vulnerabilities remediated,

D.  

new vulnerabilities identified.

Discussion 0
Questions 388

An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?

Options:

A.  

Risk scenarios

B.  

Risk ownership

C.  

Risk impact

D.  

Risk likelihood

Discussion 0
Questions 389

Quantifying the value of a single asset helps the organization to understand the:

Options:

A.  

overall effectiveness of risk management

B.  

consequences of risk materializing

C.  

necessity of developing a risk strategy,

D.  

organization s risk threshold.

Discussion 0
Questions 390

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

Options:

A.  

Risk appetite statement

B.  

Enterprise risk management framework

C.  

Risk management policies

D.  

Risk register

Discussion 0
Questions 391

When of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk register maintenance?

Options:

A.  

Remove risk that has been mitigated by third-party transfer

B.  

Remove risk that management has decided to accept

C.  

Remove risk only following a significant change in the risk environment

D.  

Remove risk when mitigation results in residual risk within tolerance levels

Discussion 0
Questions 392

Which of the following should be accountable for ensuring that media containing financial information are adequately destroyed per an organization's data disposal policy?

Options:

A.  

Compliance manager

B.  

Data architect

C.  

Data owner

D.  

Chief information officer (CIO)

Discussion 0
Questions 393

When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:

Options:

A.  

risk map

B.  

cause-and-effect diagram

C.  

maturity model

D.  

technology strategy plan.

Discussion 0
Questions 394

The acceptance of control costs that exceed risk exposure MOST likely demonstrates:

Options:

A.  

corporate culture alignment

B.  

low risk tolerance

C.  

high risk tolerance

D.  

corporate culture misalignment.

Discussion 0
Questions 395

Which of the following will help ensure the elective decision-making of an IT risk management committee?

Options:

A.  

Key stakeholders are enrolled as members

B.  

Approved minutes ate forwarded to senior management

C.  

Committee meets at least quarterly

D.  

Functional overlap across the business is minimized

Discussion 0
Questions 396

Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?

Options:

A.  

Preventive

B.  

Deterrent

C.  

Compensating

D.  

Detective

Discussion 0
Questions 397

When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?

Options:

A.  

Verbal majority acceptance of risk by committee

B.  

List of compensating controls

C.  

IT audit follow-up responses

D.  

A memo indicating risk acceptance

Discussion 0
Questions 398

WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?

Options:

A.  

Enforce sanctions for noncompliance with security procedures.

B.  

Conduct organization-w>de phishing simulations.

C.  

Require training on the data handling policy.

D.  

Require regular testing of the data breach response plan.

Discussion 0
Questions 399

Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?

Options:

A.  

Risk management budget

B.  

Risk management industry trends

C.  

Risk tolerance

D.  

Risk capacity

Discussion 0
Questions 400

What can be determined from the risk scenario chart?

Options:

A.  

Relative positions on the risk map

B.  

Risk treatment options

C.  

Capability of enterprise to implement

D.  

The multiple risk factors addressed by a chosen response

Discussion 0
Questions 401

Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?

Options:

A.  

Number of times the recovery plan is reviewed

B.  

Number of successful recovery plan tests

C.  

Percentage of systems with outdated virus protection

D.  

Percentage of employees who can work remotely

Discussion 0
Questions 402

A new international data privacy regulation requires personal data to be

disposed after the specified retention period, which is different from the local

regulatory requirement. Which of the following is the risk practitioner's

BEST course of action?

Options:

A.  

The application code has not been version controlled.

B.  

Knowledge of the applications is limited to few employees.

C.  

An IT project manager is not assigned to oversee development.

D.  

Controls are not applied to the applications.

Discussion 0
Questions 403

The PRIMARY purpose of vulnerability assessments is to:

Options:

A.  

provide clear evidence that the system is sufficiently secure.

B.  

determine the impact of potential threats.

C.  

test intrusion detection systems (IDS) and response procedures.

D.  

detect weaknesses that could lead to system compromise.

Discussion 0
Questions 404

Which of the following would be a risk practitioner’s GREATEST concern related to the monitoring of key risk indicators (KRIs)?

Options:

A.  

Logs are retained for longer than required.

B.  

Logs are reviewed annually.

C.  

Logs are stored in a multi-tenant cloud environment.

D.  

Logs are modified before analysis is conducted.

Discussion 0
Questions 405

The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:

Options:

A.  

encrypting the data

B.  

including a nondisclosure clause in the CSP contract

C.  

assessing the data classification scheme

D.  

reviewing CSP access privileges

Discussion 0
Questions 406

Recent penetration testing of an organization's software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?

Options:

A.  

SIEM software is producing faulty alerts.

B.  

Threat modeling was not utilized in the software design process.

C.  

The configuration management process is not applied consistently during development.

D.  

An identity and access management (IAM) tool has not been properly integrated into the software.

Discussion 0
Questions 407

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

Options:

A.  

It compares performance levels of IT assets to value delivered.

B.  

It facilitates the alignment of strategic IT objectives to business objectives.

C.  

It provides input to business managers when preparing a business case for new IT projects.

D.  

It helps assess the effects of IT decisions on risk exposure

Discussion 0
Questions 408

Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?

Options:

A.  

Evaluating the impact to control objectives

B.  

Conducting a root cause analysis

C.  

Validating the adequacy of current processes

D.  

Reconfiguring the IT infrastructure

Discussion 0
Questions 409

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

Options:

A.  

Update firewall configuration

B.  

Require strong password complexity

C.  

implement a security awareness program

D.  

Implement two-factor authentication

Discussion 0
Questions 410

An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?

Options:

A.  

Map the granular risk scenarios to the high-level risk register items.

B.  

List application and server vulnerabilities in the IT risk register.

C.  

Identify overlapping risk scenarios between the two registers.

D.  

Maintain both high-level and granular risk scenarios in a single register.

Discussion 0
Questions 411

An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?

Options:

A.  

Acceptance

B.  

Avoidance

C.  

Transfer

D.  

Reduction

Discussion 0
Questions 412

Which of the following is MOST important for successful incident response?

Options:

A.  

The quantity of data logged by the attack control tools

B.  

Blocking the attack route immediately

C.  

The ability to trace the source of the attack

D.  

The timeliness of attack recognition

Discussion 0
Questions 413

Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?

Options:

A.  

To align with board reporting requirements

B.  

To assist management in decision making

C.  

To create organization-wide risk awareness

D.  

To minimize risk mitigation efforts

Discussion 0
Questions 414

An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?

Options:

A.  

Assess the impact of applying the patches on the production environment.

B.  

Survey other enterprises regarding their experiences with applying these patches.

C.  

Seek information from the software vendor to enable effective application of the patches.

D.  

Determine in advance an off-peak period to apply the patches.

Discussion 0
Questions 415

Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?

Options:

A.  

Privacy risk controls

B.  

Business continuity

C.  

Risk taxonomy

D.  

Management support

Discussion 0
Questions 416

Which of the following is the PRIMARY reason to perform ongoing risk assessments?

Options:

A.  

Emerging risk must be continuously reported to management.

B.  

New system vulnerabilities emerge at frequent intervals.

C.  

The risk environment is subject to change.

D.  

The information security budget must be justified.

Discussion 0
Questions 417

Improvements in the design and implementation of a control will MOST likely result in an update to:

Options:

A.  

inherent risk.

B.  

residual risk.

C.  

risk appetite

D.  

risk tolerance

Discussion 0
Questions 418

Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?

Options:

A.  

Implementing record retention tools and techniques

B.  

Establishing e-discovery and data loss prevention (DLP)

C.  

Sending notifications when near storage quota

D.  

Implementing a bring your own device 1BVOD) policy

Discussion 0
Questions 419

When updating the risk register after a risk assessment, which of the following is MOST important to include?

Options:

A.  

Historical losses due to past risk events

B.  

Cost to reduce the impact and likelihood

C.  

Likelihood and impact of the risk scenario

D.  

Actor and threat type of the risk scenario

Discussion 0
Questions 420

Controls should be defined during the design phase of system development because:

Options:

A.  

it is more cost-effective to determine controls in the early design phase.

B.  

structured analysis techniques exclude identification of controls.

C.  

structured programming techniques require that controls be designed before coding begins.

D.  

technical specifications are defined during this phase.

Discussion 0
Questions 421

In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?

Options:

A.  

A standardized risk taxonomy

B.  

A list of control deficiencies

C.  

An enterprise risk ownership policy

D.  

An updated risk tolerance metric

Discussion 0
Questions 422

A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?

Options:

A.  

Encryption

B.  

Authentication

C.  

Configuration

D.  

Backups

Discussion 0
Questions 423

A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider who should the risk scenario be reassigned to.

Options:

A.  

Senior management

B.  

Chief risk officer (CRO)

C.  

Vendor manager

D.  

Data owner

Discussion 0
Questions 424

Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?

Options:

A.  

Previous audit reports

B.  

Control objectives

C.  

Risk responses in the risk register

D.  

Changes in risk profiles

Discussion 0
Questions 425

When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?

Options:

A.  

Risk management

B.  

Change management

C.  

Problem management

D.  

Quality management

Discussion 0
Questions 426

Which of the following is the BEST way to manage the risk associated with malicious activities performed by database administrators (DBAs)?

Options:

A.  

Activity logging and monitoring

B.  

Periodic access review

C.  

Two-factor authentication

D.  

Awareness training and background checks

Discussion 0
Questions 427

In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:

Options:

A.  

system architecture in target areas.

B.  

IT management policies and procedures.

C.  

business objectives of the organization.

D.  

defined roles and responsibilities.

Discussion 0
Questions 428

Which of the following is the BEST course of action to reduce risk impact?

Options:

A.  

Create an IT security policy.

B.  

Implement corrective measures.

C.  

Implement detective controls.

D.  

Leverage existing technology

Discussion 0
Questions 429

Which of the following risk register updates is MOST important for senior management to review?

Options:

A.  

Extending the date of a future action plan by two months

B.  

Retiring a risk scenario no longer used

C.  

Avoiding a risk that was previously accepted

D.  

Changing a risk owner

Discussion 0
Questions 430

Which of the following would be MOST useful to senior management when determining an appropriate risk response?

Options:

A.  

A comparison of current risk levels with established tolerance

B.  

A comparison of cost variance with defined response strategies

C.  

A comparison of current risk levels with estimated inherent risk levels

D.  

A comparison of accepted risk scenarios associated with regulatory compliance

Discussion 0
Questions 431

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

Options:

A.  

Risk exposure expressed in business terms

B.  

Recommendations for risk response options

C.  

Resource requirements for risk responses

D.  

List of business areas affected by the risk

Discussion 0
Questions 432

An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?

Options:

A.  

Review assignments of data ownership for key assets.

B.  

Identify staff who have access to the organization’s sensitive data.

C.  

Identify recent and historical incidents involving data loss.

D.  

Review the organization's data inventory.

Discussion 0
Questions 433

Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?

Options:

A.  

Temporarily mitigate the OS vulnerabilities

B.  

Document and implement a patching process

C.  

Evaluate permanent fixes such as patches and upgrades

D.  

Identify the vulnerabilities and applicable OS patches

Discussion 0
Questions 434

it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?

Options:

A.  

The underutilization of the replicated Iink

B.  

The cost of recovering the data

C.  

The lack of integrity of data

D.  

The loss of data confidentiality

Discussion 0
Questions 435

Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?

Options:

A.  

Prioritize risk response options

B.  

Reduce likelihood.

C.  

Address more than one risk response

D.  

Reduce impact

Discussion 0
Questions 436

Which of the following provides the MOST helpful information in identifying risk in an organization?

Options:

A.  

Risk registers

B.  

Risk analysis

C.  

Risk scenarios

D.  

Risk responses

Discussion 0
Questions 437

A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?

Options:

A.  

Key control indicator (KCI)

B.  

Key risk indicator (KRI)

C.  

Operational level agreement (OLA)

D.  

Service level agreement (SLA)

Discussion 0
Questions 438

Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?

Options:

A.  

Customer database manager

B.  

Customer data custodian

C.  

Data privacy officer

D.  

Audit committee

Discussion 0
Questions 439

Which of the following is a specific concern related to machine learning algorithms?

Options:

A.  

Low software quality

B.  

Lack of access controls

C.  

Data breaches

D.  

Data bias

Discussion 0
Questions 440

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

Options:

A.  

A recommendation for internal audit validation

B.  

Plans for mitigating the associated risk

C.  

Suggestions for improving risk awareness training

D.  

The impact to the organization’s risk profile

Discussion 0
Questions 441

Which of the following is the MOST effective control to maintain the integrity of system configuration files?

Options:

A.  

Recording changes to configuration files

B.  

Implementing automated vulnerability scanning

C.  

Restricting access to configuration documentation

D.  

Monitoring against the configuration standard

Discussion 0
Questions 442

To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?

Options:

A.  

The risk governance approach of the second and third lines of defense may differ.

B.  

The independence of the internal third line of defense may be compromised.

C.  

Cost reductions may negatively impact the productivity of other departments.

D.  

The new structure is not aligned to the organization's internal control framework.

Discussion 0
Questions 443

Which of the following is the BEST way to validate whether controls to reduce user device vulnerabilities have been implemented according to management's action plan?

Options:

A.  

Survey device owners.

B.  

Rescan the user environment.

C.  

Require annual end user policy acceptance.

D.  

Review awareness training assessment results

Discussion 0
Questions 444

An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been;

Options:

A.  

mitigated

B.  

deferred

C.  

accepted.

D.  

transferred

Discussion 0
Questions 445

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?

Options:

A.  

Impact of risk occurrence

B.  

Frequency of risk occurrence

C.  

Cost of risk response

D.  

Legal aspects of risk realization

Discussion 0
Questions 446

An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?

Options:

A.  

Acceptance

B.  

Transfer

C.  

Mitigation

D.  

Avoidance

Discussion 0
Questions 447

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

Options:

A.  

The difference In the management practices between each company

B.  

The cloud computing environment is shared with another company

C.  

The lack of a service level agreement (SLA) in the vendor contract

D.  

The organizational culture differences between each country

Discussion 0
Questions 448

A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?

Options:

A.  

Applying risk appetite

B.  

Applying risk factors

C.  

Referencing risk event data

D.  

Understanding risk culture

Discussion 0
Questions 449

Which of the following is the MOST important input when developing risk scenarios?

Options:

A.  

Key performance indicators

B.  

Business objectives

C.  

The organization's risk framework

D.  

Risk appetite

Discussion 0
Questions 450

A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?

Options:

A.  

Risk ownership is not being assigned properly.

B.  

The organization has a high level of risk appetite.

C.  

Risk management procedures are outdated.

D.  

The organization's risk awareness program is ineffective.

Discussion 0
Questions 451

Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?

Options:

A.  

Aligning IT with short-term and long-term goals of the organization

B.  

Ensuring the IT budget and resources focus on risk management

C.  

Ensuring senior management's primary focus is on the impact of identified risk

D.  

Prioritizing internal departments that provide service to customers

Discussion 0
Questions 452

The PRIMARY objective for requiring an independent review of an organization's IT risk management process should be to:

Options:

A.  

assess gaps in IT risk management operations and strategic focus.

B.  

confirm that IT risk assessment results are expressed as business impact.

C.  

verify implemented controls to reduce the likelihood of threat materialization.

D.  

ensure IT risk management is focused on mitigating potential risk.

Discussion 0
Questions 453

If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?

Options:

A.  

Confidentiality

B.  

Accountability

C.  

Availability

D.  

Integrity

Discussion 0
Questions 454

An organization control environment is MOST effective when:

Options:

A.  

control designs are reviewed periodically

B.  

controls perform as intended.

C.  

controls are implemented consistently.

D.  

controls operate efficiently

Discussion 0
Questions 455

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

Options:

A.  

Transfer

B.  

Mitigation

C.  

Avoidance

D.  

Acceptance

Discussion 0
Questions 456

To help identify high-risk situations, an organization should:

Options:

A.  

continuously monitor the environment.

B.  

develop key performance indicators (KPIs).

C.  

maintain a risk matrix.

D.  

maintain a risk register.

Discussion 0
Questions 457

When of the following provides the MOST tenable evidence that a business process control is effective?

Options:

A.  

Demonstration that the control is operating as designed

B.  

A successful walk-through of the associated risk assessment

C.  

Management attestation that the control is operating effectively

D.  

Automated data indicating that risk has been reduced

Discussion 0
Questions 458

An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?

Options:

A.  

IT service desk manager

B.  

Sales manager

C.  

Customer service manager

D.  

Access control manager

Discussion 0
Questions 459

When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:

Options:

A.  

information risk assessments with enterprise risk assessments.

B.  

key risk indicators (KRIs) with risk appetite of the business.

C.  

the control key performance indicators (KPIs) with audit findings.

D.  

control performance with risk tolerance of business owners.

Discussion 0
Questions 460

Within the three lines of defense model, the responsibility for managing risk and controls resides with:

Options:

A.  

operational management.

B.  

the risk practitioner.

C.  

the internal auditor.

D.  

executive management.

Discussion 0
Questions 461

Which of the following approaches BEST identifies information systems control deficiencies?

Options:

A.  

Countermeasures analysis

B.  

Best practice assessment

C.  

Gap analysis

D.  

Risk assessment

Discussion 0
Questions 462

Which of the following is MOST important to include in a risk assessment of an emerging technology?

Options:

A.  

Risk response plans

B.  

Risk and control ownership

C.  

Key controls

D.  

Impact and likelihood ratings

Discussion 0
Questions 463

Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?

Options:

A.  

Review vendors' internal risk assessments covering key risk and controls.

B.  

Obtain independent control reports from high-risk vendors.

C.  

Review vendors performance metrics on quality and delivery of processes.

D.  

Obtain vendor references from third parties.

Discussion 0
Questions 464

The BEST way to improve a risk register is to ensure the register:

Options:

A.  

is updated based upon significant events.

B.  

documents possible countermeasures.

C.  

contains the risk assessment completion date.

D.  

is regularly audited.

Discussion 0
Questions 465

Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk

awareness program?

Options:

A.  

Policies and procedures

B.  

Structure and culture

C.  

Key risk indicators (KRIs) and thresholds

D.  

Known threats and vulnerabilities

Discussion 0
Questions 466

Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?

Options:

A.  

Digital signature

B.  

Edit checks

C.  

Encryption

D.  

Multifactor authentication

Discussion 0
Questions 467

The BEST criteria when selecting a risk response is the:

Options:

A.  

capability to implement the response

B.  

importance of IT risk within the enterprise

C.  

effectiveness of risk response options

D.  

alignment of response to industry standards

Discussion 0
Questions 468

Which of the following BEST supports the communication of risk assessment results to stakeholders?

Options:

A.  

Monitoring of high-risk areas

B.  

Classification of risk profiles

C.  

Periodic review of the risk register

D.  

Assignment of risk ownership

Discussion 0
Questions 469

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

Options:

A.  

plan awareness programs for business managers.

B.  

evaluate maturity of the risk management process.

C.  

assist in the development of a risk profile.

D.  

maintain a risk register based on noncompliance.

Discussion 0
Questions 470

Which of the following is the MOST important benefit of implementing a data classification program?

Options:

A.  

Reduction in data complexity

B.  

Reduction in processing times

C.  

Identification of appropriate ownership

D.  

Identification of appropriate controls

Discussion 0
Questions 471

Which of the following is the MOST important reason to communicate control effectiveness to senior management?

Options:

A.  

To demonstrate alignment with industry best practices

B.  

To assure management that control ownership is assigned

C.  

To ensure management understands the current risk status

D.  

To align risk management with strategic objectives

Discussion 0
Questions 472

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

Options:

A.  

increased inherent risk.

B.  

higher risk management cost

C.  

decreased residual risk.

D.  

lower risk management cost.

Discussion 0
Questions 473

An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?

Options:

A.  

Mitigate

B.  

Accept

C.  

Transfer

D.  

Avoid

Discussion 0
Questions 474

Who is the BEST person to an application system used to process employee personal data?

Options:

A.  

Compliance manager

B.  

Data privacy manager

C.  

System administrator

D.  

Human resources (HR) manager

Discussion 0
Questions 475

Accountability for a particular risk is BEST represented in a:

Options:

A.  

risk register

B.  

risk catalog

C.  

risk scenario

D.  

RACI matrix

Discussion 0
Questions 476

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

Options:

A.  

Risk questionnaire

B.  

Risk register

C.  

Management assertion

D.  

Compliance manual

Discussion 0
Questions 477

Which of the following scenarios is MOST likely to cause a risk practitioner to request a formal risk acceptance sign-off?

Options:

A.  

Residual risk in excess of the risk appetite cannot be mitigated.

B.  

Inherent risk is too high, resulting in the cancellation of an initiative.

C.  

Risk appetite has changed to align with organizational objectives.

D.  

Residual risk remains at the same level over time without further mitigation.

Discussion 0
Questions 478

An organization's financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?

Options:

A.  

IT risk manager

B.  

IT system owner

C.  

Information security manager

D.  

Business owner

Discussion 0
Questions 479

It is MOST appropriate for changes to be promoted to production after they are:

Options:

A.  

communicated to business management

B.  

tested by business owners.

C.  

approved by the business owner.

D.  

initiated by business users.

Discussion 0
Questions 480

An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?

Options:

A.  

Audit reports

B.  

Industry benchmarks

C.  

Financial forecasts

D.  

Annual threat reports

Discussion 0
Questions 481

The BEST key performance indicator (KPI) to measure the effectiveness of the security patching process is the percentage of patches installed:

Options:

A.  

by the security administration team.

B.  

successfully within the expected time frame.

C.  

successfully during the first attempt.

D.  

without causing an unplanned system outage.

Discussion 0
Questions 482

Which of the following would prompt changes in key risk indicator {KRI) thresholds?

Options:

A.  

Changes to the risk register

B.  

Changes in risk appetite or tolerance

C.  

Modification to risk categories

D.  

Knowledge of new and emerging threats

Discussion 0