Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Question # 4

Which of the following is the MOST important objective of an enterprise risk management (ERM) program?

A.

To create a complete repository of risk to the organization

B.

To create a comprehensive view of critical risk to the organization

C.

To provide a bottom-up view of the most significant risk scenarios

D.

To optimize costs of managing risk scenarios in the organization

Full Access
Question # 5

An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?

A.

Perform a risk assessment

B.

Disable user access.

C.

Develop an access control policy.

D.

Perform root cause analysis.

Full Access
Question # 6

The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?

A.

Escalate to senior management

B.

Require a nondisclosure agreement.

C.

Sanitize portions of the register

D.

Determine the purpose of the request

Full Access
Question # 7

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

A.

Data controllers

B.

Data processors

C.

Data custodians

D.

Data owners

Full Access
Question # 8

An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:

A.

transferred

B.

mitigated.

C.

accepted

D.

avoided

Full Access
Question # 9

Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?

A.

Changes in control design

B.

A decrease in the number of key controls

C.

Changes in control ownership

D.

An increase in residual risk

Full Access
Question # 10

Risk mitigation procedures should include:

A.

buying an insurance policy.

B.

acceptance of exposures

C.

deployment of counter measures.

D.

enterprise architecture implementation.

Full Access
Question # 11

Which of the following would BEST help to ensure that suspicious network activity is identified?

A.

Analyzing intrusion detection system (IDS) logs

B.

Analyzing server logs

C.

Using a third-party monitoring provider

D.

Coordinating events with appropriate agencies

Full Access
Question # 12

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

A.

Implement a tool to create and distribute violation reports

B.

Raise awareness of encryption requirements for sensitive data.

C.

Block unencrypted outgoing emails which contain sensitive data.

D.

Implement a progressive disciplinary process for email violations.

Full Access
Question # 13

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

A.

Increase in the frequency of changes

B.

Percent of unauthorized changes

C.

Increase in the number of emergency changes

D.

Average time to complete changes

Full Access
Question # 14

Which of the following is the MOST important factor affecting risk management in an organization?

A.

The risk manager's expertise

B.

Regulatory requirements

C.

Board of directors' expertise

D.

The organization's culture

Full Access
Question # 15

An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?

A.

Employ security guards.

B.

Conduct security awareness training.

C.

Install security cameras.

D.

Require security access badges.

Full Access
Question # 16

Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?

A.

Closed management action plans from the previous audit

B.

Annual risk assessment results

C.

An updated vulnerability management report

D.

A list of identified generic risk scenarios

Full Access
Question # 17

An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk acceptance

D.

Risk transfer

Full Access
Question # 18

Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?

A.

Establish a cyber response plan

B.

Implement data loss prevention (DLP) tools.

C.

Implement network segregation.

D.

Strengthen vulnerability remediation efforts.

Full Access
Question # 19

Which of the following is the MOST important characteristic of an effective risk management program?

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Full Access
Question # 20

Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?

A.

Percentage of systems included in recovery processes

B.

Number of key systems hosted

C.

Average response time to resolve system incidents

D.

Percentage of system availability

Full Access
Question # 21

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

A.

Risk appetite statement

B.

Enterprise risk management framework

C.

Risk management policies

D.

Risk register

Full Access
Question # 22

Which of the following is the BEST approach for obtaining management buy-in

to implement additional IT controls?

A.

List requirements based on a commonly accepted IT risk management framework.

B.

Provide information on new governance, risk, and compliance (GRC) platform functionalities.

C.

Describe IT risk impact on organizational processes in monetary terms.

D.

Present new key risk indicators (KRIs) based on industry benchmarks.

Full Access
Question # 23

Which of the following would BEST help minimize the risk associated with social engineering threats?

A.

Enforcing employees’ sanctions

B.

Conducting phishing exercises

C.

Enforcing segregation of dunes

D.

Reviewing the organization's risk appetite

Full Access
Question # 24

Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?

A.

Role-specific technical training

B.

Change management audit

C.

Change control process

D.

Risk assessment

Full Access
Question # 25

Which of the following controls are BEST strengthened by a clear organizational code of ethics?

A.

Detective controls

B.

Administrative controls

C.

Technical controls

D.

Preventive controls

Full Access
Question # 26

Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?

A.

Encrypted storage of data

B.

Links to source data

C.

Audit trails for updates and deletions

D.

Check totals on data records and data fields

Full Access
Question # 27

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

A.

Risk analysis results

B.

Exception handling policy

C.

Vulnerability assessment results

D.

Benchmarking assessments

Full Access
Question # 28

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

A.

Invoke the disaster recovery plan during an incident.

B.

Prepare a cost-benefit analysis of alternatives available

C.

Implement redundant infrastructure for the application.

D.

Reduce the recovery time by strengthening the response team.

Full Access
Question # 29

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Full Access
Question # 30

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk appetite is decreased.

B.

Inherent risk is increased.

C.

Risk tolerance is decreased.

D.

Residual risk is increased.

Full Access
Question # 31

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

A.

Transfer

B.

Mitigation

C.

Avoidance

D.

Acceptance

Full Access
Question # 32

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Full Access
Question # 33

Which of the following BEST enables the identification of trends in risk levels?

A.

Correlation between risk levels and key risk indicators (KRIs) is positive.

B.

Measurements for key risk indicators (KRIs) are repeatable

C.

Quantitative measurements are used for key risk indicators (KRIs).

D.

Qualitative definitions for key risk indicators (KRIs) are used.

Full Access
Question # 34

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

identification.

B.

treatment.

C.

communication.

D.

assessment

Full Access
Question # 35

Which of the following is the MAIN reason for documenting the performance of controls?

A.

Obtaining management sign-off

B.

Demonstrating effective risk mitigation

C.

Justifying return on investment

D.

Providing accurate risk reporting

Full Access
Question # 36

Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization's risk profile?

A.

Control identification and mitigation

B.

Adoption of a compliance-based approach

C.

Prevention and detection techniques

D.

Scenario analysis and stress testing

Full Access
Question # 37

During testing, a risk practitioner finds the IT department's recovery time objective (RTO) for a key system does not align with the enterprise's business continuity plan (BCP). Which of the following should be done NEXT?

A.

Report the gap to senior management

B.

Consult with the IT department to update the RTO

C.

Complete a risk exception form.

D.

Consult with the business owner to update the BCP

Full Access
Question # 38

Which of the following roles would provide the MOST important input when identifying IT risk scenarios?

A.

Information security managers

B.

Internal auditors

C.

Business process owners

D.

Operational risk managers

Full Access
Question # 39

An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:

A.

reduce the risk to an acceptable level.

B.

communicate the consequences for violations.

C.

implement industry best practices.

D.

reduce the organization's risk appetite

Full Access
Question # 40

A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?

A.

The percentage of systems meeting recovery target times has increased.

B.

The number of systems tested in the last year has increased.

C.

The number of systems requiring a recovery plan has increased.

D.

The percentage of systems with long recovery target times has decreased.

Full Access
Question # 41

An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:

A.

identify key risk indicators (KRls) for ongoing monitoring

B.

validate the CTO's decision with the business process owner

C.

update the risk register with the selected risk response

D.

recommend that the CTO revisit the risk acceptance decision.

Full Access
Question # 42

The PRIMARY purpose of IT control status reporting is to:

A.

ensure compliance with IT governance strategy.

B.

assist internal audit in evaluating and initiating remediation efforts.

C.

benchmark IT controls with Industry standards.

D.

facilitate the comparison of the current and desired states.

Full Access
Question # 43

Which of the following would BEST help an enterprise prioritize risk scenarios?

A.

Industry best practices

B.

Placement on the risk map

C.

Degree of variances in the risk

D.

Cost of risk mitigation

Full Access
Question # 44

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

A.

requirements of management.

B.

specific risk analysis framework being used.

C.

organizational risk tolerance

D.

results of the risk assessment.

Full Access
Question # 45

A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?

A.

invoke the established incident response plan.

B.

Inform internal audit.

C.

Perform a root cause analysis

D.

Conduct an immediate risk assessment

Full Access
Question # 46

Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?

A.

Align business objectives to the risk profile.

B.

Assess risk against business objectives

C.

Implement an organization-specific risk taxonomy.

D.

Explain risk details to management.

Full Access
Question # 47

A risk manager has determined there is excessive risk with a particular technology. Who is the BEST person to own the unmitigated risk of the technology?

A.

IT system owner

B.

Chief financial officer

C.

Chief risk officer

D.

Business process owner

Full Access
Question # 48

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

A.

Percentage of IT assets with current malware definitions

B.

Number of false positives defected over a period of time

C.

Number of alerts generated by the anti-virus software

D.

Frequency of anti-vinjs software updates

Full Access
Question # 49

Which of the following is MOST important when developing key performance indicators (KPIs)?

A.

Alignment to risk responses

B.

Alignment to management reports

C.

Alerts when risk thresholds are reached

D.

Identification of trends

Full Access
Question # 50

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

A.

Risk questionnaire

B.

Risk register

C.

Management assertion

D.

Compliance manual

Full Access
Question # 51

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

A.

chief risk officer.

B.

project manager.

C.

chief information officer.

D.

business process owner.

Full Access
Question # 52

Risk management strategies are PRIMARILY adopted to:

A.

take necessary precautions for claims and losses.

B.

achieve acceptable residual risk levels.

C.

avoid risk for business and IT assets.

D.

achieve compliance with legal requirements.

Full Access
Question # 53

From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

A.

The organization gains assurance it can recover from a disaster

B.

Errors are discovered in the disaster recovery process.

C.

All business-critical systems are successfully tested.

D.

All critical data is recovered within recovery time objectives (RTOs).

Full Access
Question # 54

Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?

A.

Regional competitors' policies and standards

B.

Ability to monitor and enforce compliance

C.

Industry-standard templates

D.

Differences in regulatory requirements

Full Access
Question # 55

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

A.

Logs and system events

B.

Intrusion detection system (IDS) rules

C.

Vulnerability assessment reports

D.

Penetration test reports

Full Access
Question # 56

Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

A.

Vulnerability and threat analysis

B.

Control remediation planning

C.

User acceptance testing (UAT)

D.

Control self-assessment (CSA)

Full Access
Question # 57

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

A.

Key risk indicators (KRls)

B.

Inherent risk

C.

Residual risk

D.

Risk appetite

Full Access
Question # 58

Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

A.

a gap analysis

B.

a root cause analysis.

C.

an impact assessment.

D.

a vulnerability assessment.

Full Access
Question # 59

Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?

A.

Key risk indicator (KRI) thresholds

B.

Inherent risk

C.

Risk likelihood and impact

D.

Risk velocity

Full Access
Question # 60

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk tolerance is decreased.

B.

Residual risk is increased.

C.

Inherent risk is increased.

D.

Risk appetite is decreased

Full Access
Question # 61

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

A.

Using an aggregated view of organizational risk

B.

Ensuring relevance to organizational goals

C.

Relying on key risk indicator (KRI) data Including

D.

Trend analysis of risk metrics

Full Access
Question # 62

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

A.

Develop a compensating control.

B.

Allocate remediation resources.

C.

Perform a cost-benefit analysis.

D.

Identify risk responses

Full Access
Question # 63

Which of the following will BEST quantify the risk associated with malicious users in an organization?

A.

Business impact analysis

B.

Risk analysis

C.

Threat risk assessment

D.

Vulnerability assessment

Full Access
Question # 64

The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?

A.

Perform a root cause analysis

B.

Perform a code review

C.

Implement version control software.

D.

Implement training on coding best practices

Full Access
Question # 65

Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?

A.

The vendor must provide periodic independent assurance reports.

B.

The vendor must host data in a specific geographic location.

C.

The vendor must be held liable for regulatory fines for failure to protect data.

D.

The vendor must participate in an annual vendor performance review.

Full Access
Question # 66

Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?

A.

The number of security incidents escalated to senior management

B.

The number of resolved security incidents

C.

The number of newly identified security incidents

D.

The number of recurring security incidents

Full Access
Question # 67

Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?

A.

Identification of controls gaps that may lead to noncompliance

B.

Prioritization of risk action plans across departments

C.

Early detection of emerging threats

D.

Accurate measurement of loss impact

Full Access
Question # 68

Which of the following is the MOST cost-effective way to test a business continuity plan?

A.

Conduct interviews with key stakeholders.

B.

Conduct a tabletop exercise.

C.

Conduct a disaster recovery exercise.

D.

Conduct a full functional exercise.

Full Access
Question # 69

In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?

A.

Implementation

B.

Development

C.

Design

D.

Feasibility

Full Access
Question # 70

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

A.

Conduct social engineering testing.

B.

Audit security awareness training materials.

C.

Administer an end-of-training quiz.

D.

Perform a vulnerability assessment.

Full Access
Question # 71

A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?

A.

An increase in attempted distributed denial of service (DDoS) attacks

B.

An increase in attempted website phishing attacks

C.

A decrease in achievement of service level agreements (SLAs)

D.

A decrease in remediated web security vulnerabilities

Full Access
Question # 72

Which of the following is the BEST indication of an effective risk management program?

A.

Risk action plans are approved by senior management.

B.

Residual risk is within the organizational risk appetite

C.

Mitigating controls are designed and implemented.

D.

Risk is recorded and tracked in the risk register

Full Access
Question # 73

Which of the following is the GREATEST risk associated with the misclassification of data?

A.

inadequate resource allocation

B.

Data disruption

C.

Unauthorized access

D.

Inadequate retention schedules

Full Access
Question # 74

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Full Access
Question # 75

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

A.

Monitoring

B.

Analysis

C.

Identification

D.

Response selection

Full Access
Question # 76

Which of the following would require updates to an organization's IT risk register?

A.

Discovery of an ineffectively designed key IT control

B.

Management review of key risk indicators (KRls)

C.

Changes to the team responsible for maintaining the register

D.

Completion of the latest internal audit

Full Access
Question # 77

In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?

A.

Establishing an intellectual property agreement

B.

Evaluating each of the data sources for vulnerabilities

C.

Periodically reviewing big data strategies

D.

Benchmarking to industry best practice

Full Access
Question # 78

Which of the following practices MOST effectively safeguards the processing of personal data?

A.

Personal data attributed to a specific data subject is tokenized.

B.

Data protection impact assessments are performed on a regular basis.

C.

Personal data certifications are performed to prevent excessive data collection.

D.

Data retention guidelines are documented, established, and enforced.

Full Access
Question # 79

Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?

A.

A control self-assessment

B.

A third-party security assessment report

C.

Internal audit reports from the vendor

D.

Service level agreement monitoring

Full Access
Question # 80

Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?

A.

To build an organizational risk-aware culture

B.

To continuously improve risk management processes

C.

To comply with legal and regulatory requirements

D.

To identify gaps in risk management practices

Full Access
Question # 81

An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?

A.

Insufficient network isolation

B.

impact on network performance

C.

insecure data transmission protocols

D.

Lack of interoperability between sensors

Full Access
Question # 82

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

Full Access
Question # 83

Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?

A.

Likelihood of a threat

B.

Impact of technology risk

C.

Impact of operational risk

D.

Control weakness

Full Access
Question # 84

Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?

A.

Monitoring the risk until the exposure is reduced

B.

Setting minimum sample sizes to ensure accuracy

C.

Listing alternative causes for risk events

D.

Illustrating changes in risk trends

Full Access
Question # 85

Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?

A.

Customized regional training on local laws and regulations

B.

Policies requiring central reporting of potential procedure exceptions

C.

Ongoing awareness training to support a common risk culture

D.

Zero-tolerance policies for risk taking by middle-level managers

Full Access
Question # 86

When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?

A.

Percentage of system uptime

B.

Percentage of relevant threats mitigated

C.

Total number of threats identified

D.

Reaction time of the system to threats

Full Access
Question # 87

To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?

A.

Enforce segregation of duties.

B.

Disclose potential conflicts of interest.

C.

Delegate responsibilities involving the acquaintance.

D.

Notify the subsidiary's legal team.

Full Access
Question # 88

Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?

A.

It facilitates the use of a framework for risk management.

B.

It establishes a means for senior management to formally approve risk practices.

C.

It encourages risk-based decision making for stakeholders.

D.

It provides a basis for benchmarking against industry standards.

Full Access
Question # 89

Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?

A.

Privacy risk controls

B.

Business continuity

C.

Risk taxonomy

D.

Management support

Full Access
Question # 90

The PRIMARY reason for prioritizing risk scenarios is to:

A.

provide an enterprise-wide view of risk

B.

support risk response tracking

C.

assign risk ownership

D.

facilitate risk response decisions.

Full Access
Question # 91

Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?

A.

Data encryption has not been applied to all sensitive data across the organization.

B.

There are many data assets across the organization that need to be classified.

C.

Changes to information handling procedures are not documented.

D.

Changes to data sensitivity during the data life cycle have not been considered.

Full Access
Question # 92

The PRIMARY advantage of involving end users in continuity planning is that they:

A.

have a better understanding of specific business needs

B.

can balance the overall technical and business concerns

C.

can see the overall impact to the business

D.

are more objective than information security management.

Full Access
Question # 93

Which of the following BEST indicates the condition of a risk management program?

A.

Number of risk register entries

B.

Number of controls

C.

Level of financial support

D.

Amount of residual risk

Full Access
Question # 94

A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?

A.

Customer database manager

B.

Customer data custodian

C.

Data privacy officer

D.

Audit committee

Full Access
Question # 95

Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?

A.

Improved senior management communication

B.

Optimized risk treatment decisions

C.

Enhanced awareness of risk management

D.

Improved collaboration among risk professionals

Full Access
Question # 96

Which of the following is the PRIMARY purpose of periodically reviewing an organization's risk profile?

A.

Align business objectives with risk appetite.

B.

Enable risk-based decision making.

C.

Design and implement risk response action plans.

D.

Update risk responses in the risk register

Full Access
Question # 97

Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?

A.

Improved alignment will technical risk

B.

Better-informed business decisions

C.

Enhanced understanding of enterprise architecture (EA)

D.

Improved business operations efficiency

Full Access
Question # 98

To communicate the risk associated with IT in business terms, which of the following MUST be defined?

A.

Compliance objectives

B.

Risk appetite of the organization

C.

Organizational objectives

D.

Inherent and residual risk

Full Access
Question # 99

Which process is MOST effective to determine relevance of threats for risk scenarios?

A.

Vulnerability assessment

B.

Business impact analysis (BIA)

C.

Penetration testing

D.

Root cause analysis

Full Access
Question # 100

Which of the following would present the MOST significant risk to an organization when updating the incident response plan?

A.

Obsolete response documentation

B.

Increased stakeholder turnover

C.

Failure to audit third-party providers

D.

Undefined assignment of responsibility

Full Access
Question # 101

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

A.

Validating employee social media accounts and passwords

B.

Monitoring Internet usage on employee workstations

C.

Disabling social media access from the organization's technology

D.

Implementing training and awareness programs

Full Access
Question # 102

The PRIMARY objective of a risk identification process is to:

A.

evaluate how risk conditions are managed.

B.

determine threats and vulnerabilities.

C.

estimate anticipated financial impact of risk conditions.

D.

establish risk response options.

Full Access
Question # 103

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

A.

Assemble an incident response team.

B.

Create a disaster recovery plan (DRP).

C.

Develop a risk response plan.

D.

Initiate a business impact analysis (BIA).

Full Access
Question # 104

Vulnerabilities have been detected on an organization's systems. Applications installed on these systems will not operate if the underlying servers are updated. Which of the following is the risk practitioner's BEST course of action?

A.

Recommend the business change the application.

B.

Recommend a risk treatment plan.

C.

Include the risk in the next quarterly update to management.

D.

Implement compensating controls.

Full Access
Question # 105

Which of the following will BEST ensure that controls adequately support business goals and objectives?

A.

Using the risk management process

B.

Enforcing strict disciplinary procedures in case of noncompliance

C.

Reviewing results of the annual company external audit

D.

Adopting internationally accepted controls

Full Access
Question # 106

Which of the following BEST indicates the efficiency of a process for granting access privileges?

A.

Average time to grant access privileges

B.

Number of changes in access granted to users

C.

Average number of access privilege exceptions

D.

Number and type of locked obsolete accounts

Full Access
Question # 107

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

Full Access
Question # 108

When classifying and prioritizing risk responses, the areas to address FIRST are those with:

A.

low cost effectiveness ratios and high risk levels

B.

high cost effectiveness ratios and low risk levels.

C.

high cost effectiveness ratios and high risk levels

D.

low cost effectiveness ratios and low risk levels.

Full Access
Question # 109

A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?

A.

A post-implementation review has been conducted by key personnel.

B.

A qualified independent party assessed the new controls as effective.

C.

Senior management has signed off on the design of the controls.

D.

Robots have operated without human interference on a daily basis.

Full Access
Question # 110

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

A.

Evaluating risk impact

B.

Establishing key performance indicators (KPIs)

C.

Conducting internal audits

D.

Creating quarterly risk reports

Full Access
Question # 111

Which of the following provides the BEST evidence of the effectiveness of an organization's account provisioning process?

A.

User provisioning

B.

Role-based access controls

C.

Security log monitoring

D.

Entitlement reviews

Full Access
Question # 112

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

A.

A record of incidents is maintained.

B.

Forensic investigations are facilitated.

C.

Security violations can be identified.

D.

Developing threats are detected earlier.

Full Access
Question # 113

When of the following 15 MOST important when developing a business case for a proposed security investment?

A.

identification of control requirements

B.

Alignment to business objectives

C.

Consideration of new business strategies

D.

inclusion of strategy for regulatory compliance

Full Access
Question # 114

The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:

A.

resources to monitor backups

B.

restoration monitoring reports

C.

backup recovery requests

D.

recurring restore failures

Full Access
Question # 115

Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?

A.

Relevant risk case studies

B.

Internal audit findings

C.

Risk assessment results

D.

Penetration testing results

Full Access
Question # 116

Which of the following will BEST mitigate the risk associated with IT and business misalignment?

A.

Establishing business key performance indicators (KPIs)

B.

Introducing an established framework for IT architecture

C.

Establishing key risk indicators (KRIs)

D.

Involving the business process owner in IT strategy

Full Access
Question # 117

An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?

A.

Risk manager

B.

Data owner

C.

End user

D.

IT department

Full Access
Question # 118

Which of the following will BEST help in communicating strategic risk priorities?

A.

Heat map

B.

Business impact analysis (BIA)

C.

Balanced Scorecard

D.

Risk register

Full Access
Question # 119

An organization's capability to implement a risk management framework is PRIMARILY influenced by the:

A.

guidance of the risk practitioner.

B.

competence of the staff involved.

C.

approval of senior management.

D.

maturity of its risk culture.

Full Access
Question # 120

Which of the following is the BEST way to identify changes to the risk landscape?

A.

Internal audit reports

B.

Access reviews

C.

Threat modeling

D.

Root cause analysis

Full Access
Question # 121

Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?

A.

Requiring a printer access code for each user

B.

Using physical controls to access the printer room

C.

Using video surveillance in the printer room

D.

Ensuring printer parameters are properly configured

Full Access
Question # 122

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.

Implement segregation of duties.

B.

Enforce an internal data access policy.

C.

Enforce the use of digital signatures.

D.

Apply single sign-on for access control.

Full Access
Question # 123

Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?

A.

Designing compensating controls

B.

Determining if KRIs have been updated recently

C.

Assessing the effectiveness of the incident response plan

D.

Determining what has changed in the environment

Full Access
Question # 124

Which of the following should be done FIRST when information is no longer required to support business objectives?

A.

Archive the information to a backup database.

B.

Protect the information according to the classification policy.

C.

Assess the information against the retention policy.

D.

Securely and permanently erase the information

Full Access
Question # 125

Which of the following is the MOST important responsibility of a risk owner?

A.

Testing control design

B.

Accepting residual risk

C.

Establishing business information criteria

D.

Establishing the risk register

Full Access
Question # 126

Which of the following should be the GREATEST concern for an organization that uses open source software applications?

A.

Lack of organizational policy regarding open source software

B.

Lack of reliability associated with the use of open source software

C.

Lack of monitoring over installation of open source software in the organization

D.

Lack of professional support for open source software

Full Access
Question # 127

Which of the following is the MOST important component in a risk treatment plan?

A.

Technical details

B.

Target completion date

C.

Treatment plan ownership

D.

Treatment plan justification

Full Access
Question # 128

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

A.

Sharing company information on social media

B.

Sharing personal information on social media

C.

Using social media to maintain contact with business associates

D.

Using social media for personal purposes during working hours

Full Access
Question # 129

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?

A.

Ask the business to make a budget request to remediate the problem.

B.

Build a business case to remediate the fix.

C.

Research the types of attacks the threat can present.

D.

Determine the impact of the missing threat.

Full Access
Question # 130

An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:

A.

a lack of mitigating actions for identified risk

B.

decreased threat levels

C.

ineffective service delivery

D.

ineffective IT governance

Full Access
Question # 131

Which of the following approaches would BEST help to identify relevant risk scenarios?

A.

Engage line management in risk assessment workshops.

B.

Escalate the situation to risk leadership.

C.

Engage internal audit for risk assessment workshops.

D.

Review system and process documentation.

Full Access
Question # 132

Which of the following is the BEST indicator of an effective IT security awareness program?

A.

Decreased success rate of internal phishing tests

B.

Decreased number of reported security incidents

C.

Number of disciplinary actions issued for security violations

D.

Number of employees that complete security training

Full Access
Question # 133

Which of the following BEST indicates the effectiveness of anti-malware software?

A.

Number of staff hours lost due to malware attacks

B.

Number of downtime hours in business critical servers

C.

Number of patches made to anti-malware software

D.

Number of successful attacks by malicious software

Full Access
Question # 134

Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:

A.

is in charge of information security.

B.

is responsible for enterprise risk management (ERM)

C.

can implement remediation action plans.

D.

is accountable for loss if the risk materializes.

Full Access
Question # 135

Which of the following should be an element of the risk appetite of an organization?

A.

The effectiveness of compensating controls

B.

The enterprise's capacity to absorb loss

C.

The residual risk affected by preventive controls

D.

The amount of inherent risk considered appropriate

Full Access
Question # 136

Which of the following provides the MOST useful information when determining if a specific control should be implemented?

A.

Business impact analysis (BIA)

B.

Cost-benefit analysis

C.

Attribute analysis

D.

Root cause analysis

Full Access
Question # 137

Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

A.

To ensure IT risk management is focused on mitigating emerging risk

B.

To confirm that IT risk assessment results are expressed in quantitative terms

C.

To evaluate threats to the organization's operations and strategy

D.

To identify gaps in the alignment of IT risk management processes and strategy

Full Access
Question # 138

A service provider is managing a client’s servers. During an audit of the service, a noncompliant control is discovered that will not be resolved before the next audit because the client cannot afford the downtime required to correct the issue. The service provider’s MOST appropriate action would be to:

A.

develop a risk remediation plan overriding the client's decision

B.

make a note for this item in the next audit explaining the situation

C.

insist that the remediation occur for the benefit of other customers

D.

ask the client to document the formal risk acceptance for the provider

Full Access
Question # 139

Which of the following BEST indicates that additional or improved controls ate needed m the environment?

A.

Management, has decreased organisational risk appetite

B.

The risk register and portfolio do not include all risk scenarios

C.

merging risk scenarios have been identified

D.

Risk events and losses exceed risk tolerance

Full Access
Question # 140

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

A.

Evaluate current risk management alignment with relevant regulations.

B.

Determine if business continuity procedures are reviewed and updated on a regular basis.

C.

Review the methodology used to conduct the business impact analysis (BIA).

D.

Conduct a benchmarking exercise against industry peers.

Full Access
Question # 141

The MAIN reason for creating and maintaining a risk register is to:

A.

assess effectiveness of different projects.

B.

define the risk assessment methodology.

C.

ensure assets have low residual risk.

D.

account for identified key risk factors.

Full Access
Question # 142

Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?

A.

To reduce the likelihood of insider threat

B.

To eliminate the possibility of insider threat

C.

To enable rapid discovery of insider threat

D.

To reduce the impact of insider threat

Full Access
Question # 143

Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?

A.

It provides a cost-benefit analysis on control options available for implementation.

B.

It provides a view on where controls should be applied to maximize the uptime of servers.

C.

It provides historical information about the impact of individual servers malfunctioning.

D.

It provides a comprehensive view of the impact should the servers simultaneously fail.

Full Access
Question # 144

Which of the following is the GREATEST risk associated with inappropriate classification of data?

A.

Inaccurate record management data

B.

Users having unauthorized access to data

C.

Inaccurate recovery time objectives (RTOs)

D.

Lack of accountability for data ownership

Full Access
Question # 145

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

A.

Monitoring risk responses

B.

Applying risk treatments

C.

Providing assurance of control effectiveness

D.

Implementing internal controls

Full Access
Question # 146

The BEST reason to classify IT assets during a risk assessment is to determine the:

A.

priority in the risk register.

B.

business process owner.

C.

enterprise risk profile.

D.

appropriate level of protection.

Full Access
Question # 147

Which of the following is the PRIMARY objective of maintaining an information asset inventory?

A.

To provide input to business impact analyses (BIAs)

B.

To protect information assets

C.

To facilitate risk assessments

D.

To manage information asset licensing

Full Access
Question # 148

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

A.

IT risk practitioner

B.

Third -partf3ecurity team

C.

The relationship owner

D.

Legal representation of the business

Full Access
Question # 149

Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?

A.

Well documented policies and procedures

B.

Risk and issue tracking

C.

An IT strategy committee

D.

Change and release management

Full Access
Question # 150

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

A.

Review historical application down me and frequency

B.

Assess the potential impact and cost of mitigation

C.

identify other legacy systems within the organization

D.

Explore the feasibility of replacing the legacy system

Full Access
Question # 151

Which of the following would MOST likely require a risk practitioner to update the risk register?

A.

An alert being reported by the security operations center.

B.

Development of a project schedule for implementing a risk response

C.

Completion of a project for implementing a new control

D.

Engagement of a third party to conduct a vulnerability scan

Full Access
Question # 152

Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?

A.

Key risk indicators (KRIs)

B.

Risk governance charter

C.

Organizational risk appetite

D.

Cross-business representation

Full Access
Question # 153

Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?

A.

Gap analysis

B.

Threat assessment

C.

Resource skills matrix

D.

Data quality assurance plan

Full Access
Question # 154

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

A.

Absorb the loss in productivity.

B.

Request a waiver to the requirements.

C.

Escalate the issue to senior management

D.

Remove the control to accommodate business objectives.

Full Access
Question # 155

Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?

A.

Perform a business case analysis

B.

Implement compensating controls.

C.

Conduct a control sell-assessment (CSA)

D.

Build a provision for risk

Full Access
Question # 156

Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?

A.

Business impact analysis (BIA) results

B.

Risk scenario ownership

C.

Risk thresholds

D.

Possible causes of materialized risk

Full Access
Question # 157

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

A.

Information security officer

B.

IT risk manager

C.

Business owner

D.

Chief risk officer (CRO)

Full Access
Question # 158

Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?

A.

Configuration validation

B.

Control attestation

C.

Penetration testing

D.

Internal audit review

Full Access
Question # 159

The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:

A.

Identify new or emerging risk issues.

B.

Satisfy audit requirements.

C.

Survey and analyze historical risk data.

D.

Understand internal and external threat agents.

Full Access
Question # 160

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 161

The BEST indicator of the risk appetite of an organization is the

A.

regulatory environment of the organization

B.

risk management capability of the organization

C.

board of directors' response to identified risk factors

D.

importance assigned to IT in meeting strategic goals

Full Access
Question # 162

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 163

Before assigning sensitivity levels to information it is MOST important to:

A.

define recovery time objectives (RTOs).

B.

define the information classification policy

C.

conduct a sensitivity analyse

D.

Identify information custodians

Full Access
Question # 164

Which of the following is MOST helpful to understand the consequences of an IT risk event?

A.

Fault tree analysis

B.

Historical trend analysis

C.

Root cause analysis

D.

Business impact analysis (BIA)

Full Access
Question # 165

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs assist in the preparation of the organization's risk profile.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization

D.

KRIs provide an early warning that a risk threshold is about to be reached.

Full Access
Question # 166

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

A.

Control effectiveness

B.

Risk appetite

C.

Risk likelihood

D.

Key risk indicator (KRI)

Full Access
Question # 167

An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?

A.

Threat

B.

Risk

C.

Vulnerability

D.

Policy violation

Full Access
Question # 168

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''

A.

To ensure completion of the risk assessment cycle

B.

To ensure controls arc operating effectively

C.

To ensure residual risk Is at an acceptable level

D.

To ensure control costs do not exceed benefits

Full Access
Question # 169

Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?

A.

The cost associated with incident response activities

The composition and number of records in the information asset

B.

The maximum levels of applicable regulatory fines

C.

The length of time between identification and containment of the incident

Full Access
Question # 170

Which of the following is the GREATEST benefit of centralizing IT systems?

A.

Risk reporting

B.

Risk classification

C.

Risk monitoring

D.

Risk identification

Full Access
Question # 171

An organization's chief information officer (CIO) has proposed investing in a new. untested technology to take advantage of being first to market Senior management has concerns about the success of the project and has set a limit for expenditures before final approval. This conditional approval indicates the organization's risk:

A.

capacity.

B.

appetite.

C.

management capability.

D.

treatment strategy.

Full Access
Question # 172

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

A.

The volume of risk scenarios is too large

B.

Risk aggregation has not been completed

C.

Risk scenarios are not applicable

D.

The risk analysts for each scenario is incomplete

Full Access
Question # 173

When is the BEST to identify risk associated with major project to determine a mitigation plan?

A.

Project execution phase

B.

Project initiation phase

C.

Project closing phase

D.

Project planning phase

Full Access
Question # 174

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

A.

data logging and monitoring

B.

data mining and analytics

C.

data classification and labeling

D.

data retention and destruction

Full Access
Question # 175

A MAJOR advantage of using key risk indicators (KRis) is that (hey

A.

identify when risk exceeds defined thresholds

B.

assess risk scenarios that exceed defined thresholds

C.

identify scenarios that exceed defined risk appetite

D.

help with internal control assessments concerning risk appellate

Full Access
Question # 176

Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?

A.

To align with board reporting requirements

B.

To assist management in decision making

C.

To create organization-wide risk awareness

D.

To minimize risk mitigation efforts

Full Access
Question # 177

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.

Control owner

B.

Risk owner

C.

Internal auditor

D.

Compliance manager

Full Access
Question # 178

The MAIN reason for prioritizing IT risk responses is to enable an organization to:

A.

determine the risk appetite.

B.

determine the budget.

C.

define key performance indicators (KPIs).

D.

optimize resource utilization.

Full Access
Question # 179

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.

Prioritizing and addressing risk in line with risk appetite

. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

Full Access
Question # 180

Which of the following is MOST important for senior management to review during an acquisition?

A.

Risk appetite and tolerance

B.

Risk framework and methodology

C.

Key risk indicator (KRI) thresholds

D.

Risk communication plan

Full Access
Question # 181

An organization's business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner's PRIMARY consideration when participating in development of the new strategy?

A.

Scale of technology

B.

Risk indicators

C.

Risk culture

D.

Proposed risk budget

Full Access
Question # 182

Which of the following would provide the BEST evidence of an effective internal control environment/?

A.

Risk assessment results

B.

Adherence to governing policies

C.

Regular stakeholder briefings

D.

Independent audit results

Full Access
Question # 183

It is MOST important that security controls for a new system be documented in:

A.

testing requirements

B.

the implementation plan.

C.

System requirements

D.

The security policy

Full Access
Question # 184

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs provide an early warning that a risk threshold is about to be reached.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization.

D.

KRIs assist in the preparation of the organization's risk profile.

Full Access
Question # 185

Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?

A.

Conduct penetration testing.

B.

Interview IT operations personnel.

C.

Conduct vulnerability scans.

D.

Review change control board documentation.

Full Access
Question # 186

Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?

A.

IT security manager

B.

IT personnel

C.

Data custodian

D.

Data owner

Full Access
Question # 187

Which of the following is the BEST method of creating risk awareness in an organization?

A.

Marking the risk register available to project stakeholders

B.

Ensuring senior management commitment to risk training

C.

Providing regular communication to risk managers

D.

Appointing the risk manager from the business units

Full Access
Question # 188

An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?

A.

Prepare a cost-benefit analysis to evaluate relocation.

B.

Prepare a disaster recovery plan (DRP).

C.

Conduct a business impact analysis (BIA) for an alternate location.

D.

Develop a business continuity plan (BCP).

Full Access
Question # 189

An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:

A.

a recognized industry control framework

B.

guidance provided by the external auditor

C.

the service provider's existing controls

D.

The organization's specific control requirements

Full Access
Question # 190

A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?

A.

Define information retention requirements and policies

B.

Provide information security awareness training

C.

Establish security management processes and procedures

D.

Establish an inventory of information assets

Full Access
Question # 191

Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?

A.

The organization may not have a sufficient number of skilled resources.

B.

Application and data migration cost for backups may exceed budget.

C.

Data may not be recoverable due to system failures.

D.

The database system may not be scalable in the future.

Full Access
Question # 192

An organization control environment is MOST effective when:

A.

control designs are reviewed periodically

B.

controls perform as intended.

C.

controls are implemented consistently.

D.

controls operate efficiently

Full Access
Question # 193

Which of the following is MOST important to consider before determining a response to a vulnerability?

A.

The likelihood and impact of threat events

B.

The cost to implement the risk response

C.

Lack of data to measure threat events

D.

Monetary value of the asset

Full Access
Question # 194

Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?

A.

Deleting the data from the file system

B.

Cryptographically scrambling the data

C.

Formatting the cloud storage at the block level

D.

Degaussing the cloud storage media

Full Access
Question # 195

The MAIN purpose of selecting a risk response is to.

A.

ensure compliance with local regulatory requirements

B.

demonstrate the effectiveness of risk management practices.

C.

ensure organizational awareness of the risk level

D.

mitigate the residual risk to be within tolerance

Full Access
Question # 196

Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?

A.

Reviewing the results of independent audits

B.

Performing a site visit to the cloud provider's data center

C.

Performing a due diligence review

D.

Conducting a risk workshop with key stakeholders

Full Access
Question # 197

Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?

A.

Risk register

B.

Risk appetite

C.

Risk priorities

D.

Risk heat maps

Full Access
Question # 198

Which of the following should be the FIRST consideration when establishing a new risk governance program?

A.

Developing an ongoing awareness and training program

B.

Creating policies and standards that are easy to comprehend

C.

Embedding risk management into the organization

D.

Completing annual risk assessments on critical resources

Full Access
Question # 199

Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?

A.

Verifying that project objectives are met

B.

Identifying project cost overruns

C.

Leveraging an independent review team

D.

Reviewing the project initiation risk matrix

Full Access
Question # 200

Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?

A.

Increased time to remediate vulnerabilities

B.

Inaccurate reporting of results

C.

Increased number of vulnerabilities

D.

Network performance degradation

Full Access
Question # 201

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

A.

Implementing risk treatment plans

B.

Validating the status of risk mitigation efforts

C.

Establishing risk policies and standards

D.

Conducting independent reviews of risk assessment results

Full Access
Question # 202

Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?

A.

To support decision-making for risk response

B.

To hold risk owners accountable for risk action plans

C.

To secure resourcing for risk treatment efforts

D.

To enable senior management to compile a risk profile

Full Access
Question # 203

Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?

A.

A centralized computer security response team

B.

Regular performance reviews and management check-ins

C.

Code of ethics training for all employees

D.

Communication of employee activity monitoring

Full Access
Question # 204

Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?

A.

Some critical business applications are not included in the plan

B.

Several recovery activities will be outsourced

C.

The plan is not based on an internationally recognized framework

D.

The chief information security officer (CISO) has not approved the plan

Full Access
Question # 205

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

A.

Enroll the employee in additional security training.

B.

Invoke the incident response plan.

C.

Conduct an internal audit.

D.

Instruct the vendor to delete the data.

Full Access
Question # 206

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?

A.

Forensic analysis

B.

Risk assessment

C.

Root cause analysis

D.

Business impact analysis (BlA)

Full Access
Question # 207

Which of the following is MOST important information to review when developing plans for using emerging technologies?

A.

Existing IT environment

B.

IT strategic plan

C.

Risk register

D.

Organizational strategic plan

Full Access
Question # 208

Which of the following is MOST helpful in providing an overview of an organization's risk management program?

A.

Risk management treatment plan

B.

Risk assessment results

C.

Risk management framework

D.

Risk register

Full Access
Question # 209

An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?

A.

Limited organizational knowledge of the underlying technology

B.

Lack of commercial software support

C.

Varying costs related to implementation and maintenance

D.

Slow adoption of the technology across the financial industry

Full Access
Question # 210

An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?

A.

Security control owners based on control failures

B.

Cyber risk remediation plan owners

C.

Risk owners based on risk impact

D.

Enterprise risk management (ERM) team

Full Access
Question # 211

Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?

A.

Risk mitigation plans

B.

heat map

C.

Risk appetite statement

D.

Key risk indicators (KRls)

Full Access
Question # 212

Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?

A.

Reject the risk acceptance and require mitigating controls.

B.

Monitor the residual risk level of the accepted risk.

C.

Escalate the risk decision to the project sponsor for review.

D.

Document the risk decision in the project risk register.

Full Access
Question # 213

As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?

A.

An assessment of threats to the organization

B.

An assessment of recovery scenarios

C.

industry standard framework

D.

Documentation of testing procedures

Full Access
Question # 214

In order to determining a risk is under-controlled the risk practitioner will need to

A.

understand the risk tolerance

B.

monitor and evaluate IT performance

C.

identify risk management best practices

D.

determine the sufficiency of the IT risk budget

Full Access
Question # 215

Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?

A.

Prioritize risk response options

B.

Reduce likelihood.

C.

Address more than one risk response

D.

Reduce impact

Full Access
Question # 216

Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?

A.

Ensuring processes are documented to enable effective control execution

B.

Ensuring regular risk messaging is Included in business communications from leadership

C.

Ensuring schedules and deadlines for control-related deliverables are strictly monitored

D.

Ensuring performance metrics balance business goals with risk appetite

Full Access
Question # 217

Which of the following is MOST important for an organization to consider when developing its IT strategy?

A.

IT goals and objectives

B.

Organizational goals and objectives

C.

The organization's risk appetite statement

D.

Legal and regulatory requirements

Full Access
Question # 218

When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:

A.

information risk assessments with enterprise risk assessments.

B.

key risk indicators (KRIs) with risk appetite of the business.

C.

the control key performance indicators (KPIs) with audit findings.

D.

control performance with risk tolerance of business owners.

Full Access
Question # 219

Which of the following is MOST important for successful incident response?

A.

The quantity of data logged by the attack control tools

B.

Blocking the attack route immediately

C.

The ability to trace the source of the attack

D.

The timeliness of attack recognition

Full Access
Question # 220

Which of the following is the MOST important consideration for effectively maintaining a risk register?

A.

An IT owner is assigned for each risk scenario.

B.

The register is updated frequently.

C.

The register is shared with executive management.

D.

Compensating controls are identified.

Full Access
Question # 221

A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?

A.

Determine whether risk responses are still adequate.

B.

Analyze and update control assessments with the new processes.

C.

Analyze the risk and update the risk register as needed.

D.

Conduct testing of the control that mitigate the existing risk.

Full Access
Question # 222

An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?

A.

The controls may not be properly tested

B.

The vendor will not ensure against control failure

C.

The vendor will not achieve best practices

D.

Lack of a risk-based approach to access control

Full Access
Question # 223

Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?

A.

Implement user access controls

B.

Perform regular internal audits

C.

Develop and communicate fraud prevention policies

D.

Conduct fraud prevention awareness training.

Full Access
Question # 224

Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''

A.

Implement role-based access control

B.

Implement a data masking process

C.

Include sanctions in nondisclosure agreements (NDAs)

D.

Install a data loss prevention (DLP) tool

Full Access
Question # 225

Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?

A.

Reassessing control effectiveness of the process

B.

Conducting a post-implementation review to determine lessons learned

C.

Reporting key performance indicators (KPIs) for core processes

D.

Establishing escalation procedures for anomaly events

Full Access
Question # 226

Which of the following is the MOST important consideration when developing risk strategies?

A.

Organization's industry sector

B.

Long-term organizational goals

C.

Concerns of the business process owners

D.

History of risk events

Full Access
Question # 227

Which of the following is the BEST control to minimize the risk associated with scope creep in software development?

A.

An established process for project change management

B.

Retention of test data and results for review purposes

C.

Business managements review of functional requirements

D.

Segregation between development, test, and production

Full Access
Question # 228

Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?

A.

Several risk action plans have missed target completion dates.

B.

Senior management has accepted more risk than usual.

C.

Risk associated with many assets is only expressed in qualitative terms.

D.

Many risk scenarios are owned by the same senior manager.

Full Access
Question # 229

An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?

A.

Recommend additional controls to address the risk.

B.

Update the risk tolerance level to acceptable thresholds.

C.

Update the incident-related risk trend in the risk register.

D.

Recommend a root cause analysis of the incidents.

Full Access
Question # 230

An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?

A.

Nondisclosure agreements (NDAs)

B.

Data anonymization

C.

Data cleansing

D.

Data encryption

Full Access
Question # 231

Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?

A.

The cloud environment's capability maturity model

B.

The cloud environment's risk register

C.

The cloud computing architecture

D.

The organization's strategic plans for cloud computing

Full Access
Question # 232

Which of the following provides the MOST comprehensive information when developing a risk profile for a system?

A.

Results of a business impact analysis (BIA)

B.

Risk assessment results

C.

A mapping of resources to business processes

D.

Key performance indicators (KPIs)

Full Access
Question # 233

Which of the following BEST reduces the risk associated with the theft of a laptop containing sensitive information?

A.

Cable lock

B.

Data encryption

C.

Periodic backup

D.

Biometrics access control

Full Access
Question # 234

Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?

A.

Ability to determine business impact

B.

Up-to-date knowledge on risk responses

C.

Decision-making authority for risk treatment

D.

Awareness of emerging business threats

Full Access
Question # 235

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

A.

Do not collect or retain data that is not needed.

B.

Redact data where possible.

C.

Limit access to the personal data.

D.

Ensure all data is encrypted at rest and during transit.

Full Access
Question # 236

An organization's control environment is MOST effective when:

A.

controls perform as intended.

B.

controls operate efficiently.

C.

controls are implemented consistent

D.

control designs are reviewed periodically

Full Access
Question # 237

A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?

A.

Aggregated key performance indicators (KPls)

B.

Key risk indicators (KRIs)

C.

Centralized risk register

D.

Risk heat map

Full Access
Question # 238

An organization's risk tolerance should be defined and approved by which of the following?

A.

The chief risk officer (CRO)

B.

The board of directors

C.

The chief executive officer (CEO)

D.

The chief information officer (CIO)

Full Access
Question # 239

The maturity of an IT risk management program is MOST influenced by:

A.

the organization's risk culture

B.

benchmarking results against similar organizations

C.

industry-specific regulatory requirements

D.

expertise available within the IT department

Full Access
Question # 240

Which of the following will BEST help an organization select a recovery strategy for critical systems?

A.

Review the business impact analysis.

B.

Create a business continuity plan.

C.

Analyze previous disaster recovery reports.

D.

Conduct a root cause analysis.

Full Access
Question # 241

Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?

A.

To enhance compliance with standards

B.

To minimize subjectivity of assessments

C.

To increase consensus among peers

D.

To provide assessments for benchmarking

Full Access
Question # 242

Controls should be defined during the design phase of system development because:

A.

it is more cost-effective to determine controls in the early design phase.

B.

structured analysis techniques exclude identification of controls.

C.

structured programming techniques require that controls be designed before coding begins.

D.

technical specifications are defined during this phase.

Full Access
Question # 243

A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?

A.

Internal audit

B.

Control owner

C.

Senior management

D.

Risk manager

Full Access
Question # 244

Which of the following is a crucial component of a key risk indicator (KRI) to ensure appropriate action is taken to mitigate risk?

A.

Management intervention

B.

Risk appetite

C.

Board commentary

D.

Escalation triggers

Full Access
Question # 245

Which of the following is MOST important for managing ethical risk?

A.

Involving senior management in resolving ethical disputes

B.

Developing metrics to trend reported ethics violations

C.

Identifying the ethical concerns of each stakeholder

D.

Establishing a code of conduct for employee behavior

Full Access
Question # 246

Which of the following events is MOST likely to trigger the need to conduct a risk assessment?

A.

An incident resulting in data loss

B.

Introduction of a new product line

C.

Changes in executive management

D.

Updates to the information security policy

Full Access
Question # 247

An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?

A.

Whether the service provider's data center is located in the same country

B.

Whether the data sent by email has been encrypted

C.

Whether the data has been appropriately classified

D.

Whether the service provider contract allows right of onsite audit

Full Access
Question # 248

A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?

A.

Request a policy exception from senior management.

B.

Comply with the organizational policy.

C.

Report the noncompliance to the local regulatory agency.

D.

Request an exception from the local regulatory agency.

Full Access
Question # 249

Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?

A.

Solutions for eradicating emerging threats

B.

Cost to mitigate the risk resulting from threats

C.

Indicators for detecting the presence of threatsl)

D.

Source and identity of attackers

Full Access
Question # 250

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Full Access
Question # 251

Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?

A.

Risk management

B.

Business units

C.

External audit

D.

Internal audit

Full Access
Question # 252

Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?

A.

Conducting security awareness training

B.

Updating the information security policy

C.

Implementing mock phishing exercises

D.

Requiring two-factor authentication

Full Access
Question # 253

Which of the following is the GREATEST benefit of using IT risk scenarios?

A.

They support compliance with regulations.

B.

They provide evidence of risk assessment.

C.

They facilitate communication of risk.

D.

They enable the use of key risk indicators (KRls)

Full Access
Question # 254

An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?

A.

Variances in recovery times

B.

Ownership assignment for controls

C.

New potentially disruptive scenarios

D.

Contractual changes with customers

Full Access
Question # 255

Which of the following is the MOST important document regarding the treatment of sensitive data?

A.

Encryption policy

B.

Organization risk profile

C.

Digital rights management policy

D.

Information classification policy

Full Access
Question # 256

Which of the following is the PRIMARY objective of aggregating the impact of IT risk scenarios and reflecting the results in the enterprise risk register?

A.

To ensure IT risk appetite is communicated across the organization

B.

To ensure IT risk impact can be compared to the IT risk appetite

C.

To ensure IT risk ownership is assigned at the appropriate organizational level

D.

To ensure IT risk scenarios are consistently assessed within the organization

Full Access
Question # 257

When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?

A.

Results of benchmarking studies

B.

Results of risk assessments

C.

Number of emergency change requests

D.

Maturity model

Full Access
Question # 258

Which of the following provides the BEST evidence that risk responses are effective?

A.

Residual risk is within risk tolerance.

B.

Risk with low impact is accepted.

C.

Risk ownership is identified and assigned.

D.

Compliance breaches are addressed in a timely manner.

Full Access
Question # 259

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

A.

Update firewall configuration

B.

Require strong password complexity

C.

implement a security awareness program

D.

Implement two-factor authentication

Full Access
Question # 260

A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?

A.

Appropriate approvals for the control changes

B.

The reason the action plan was modified

C.

The risk owner's approval of the revised action plan

D.

The effectiveness of the resulting control

Full Access
Question # 261

One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?

A.

Additional mitigating controls should be identified.

B.

The system should not be used until the application is changed

C.

The organization's IT risk appetite should be adjusted.

D.

The associated IT risk should be accepted by management.

Full Access
Question # 262

Which of the following BEST enables detection of ethical violations committed by employees?

A.

Transaction log monitoring

B.

Whistleblower program

C.

Access control attestation

D.

Periodic job rotation

Full Access
Question # 263

Which of the following is the PRIMARY purpose of a risk register?

A.

To assign control ownership of risk

B.

To provide a centralized view of risk

C.

To identify opportunities to transfer risk

D.

To mitigate organizational risk

Full Access
Question # 264

A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?

A.

Implement new controls.

B.

Recalibrate the key performance indicator (KPI).

C.

Redesign the process.

D.

Re-evaluate the existing control design.

Full Access
Question # 265

The PRIMARY reason to implement a formalized risk taxonomy is to:

A.

reduce subjectivity in risk management.

B.

comply with regulatory requirements.

C.

demonstrate best industry practice.

D.

improve visibility of overall risk exposure.

Full Access
Question # 266

A risk practitioner notices that a particular key risk indicator (KRI) has remained below its established trigger point for an extended period of time. Which of the following should be done FIRST?

A.

Recommend a re-evaluation of the current threshold of the KRI.

B.

Notify management that KRIs are being effectively managed.

C.

Update the risk rating associated with the KRI In the risk register.

D.

Update the risk tolerance and risk appetite to better align to the KRI.

Full Access
Question # 267

An organization is considering adopting artificial intelligence (AI). Which of the

following is the risk practitioner's MOST important course of action?

A.

Develop key risk indicators (KRIs).

B.

Ensure sufficient pre-implementation testing.

C.

Identify applicable risk scenarios.

D.

Identify the organization's critical data.

Full Access
Question # 268

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

A.

A recommendation for internal audit validation

B.

Plans for mitigating the associated risk

C.

Suggestions for improving risk awareness training

D.

The impact to the organization’s risk profile

Full Access
Question # 269

Which of the following would BEST help identify the owner for each risk scenario in a risk register?

A.

Determining which departments contribute most to risk

B.

Allocating responsibility for risk factors equally to asset owners

C.

Mapping identified risk factors to specific business processes

D.

Determining resource dependency of assets

Full Access
Question # 270

An organization has decided to implement an emerging technology and incorporate the new capabilities into its strategic business plan. Business operations for the technology will be outsourced. What will be the risk practitioner's PRIMARY role during the change?

A.

Managing third-party risk

B.

Developing risk scenarios

C.

Managing the threat landscape

D.

Updating risk appetite

Full Access
Question # 271

A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?

A.

Preventive

B.

Detective

C.

Directive

D.

Deterrent

Full Access
Question # 272

Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?

A.

Disciplinary action

B.

A control self-assessment

C.

A review of the awareness program

D.

Root cause analysis

Full Access
Question # 273

Which of the following should be the PRIMARY recipient of reports showing the

progress of a current IT risk mitigation project?

A.

Senior management

B.

Project manager

C.

Project sponsor

D.

IT risk manager

Full Access
Question # 274

An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?

A.

Chief information security officer

B.

Business process owner

C.

Chief risk officer

D.

IT controls manager

Full Access
Question # 275

Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?

A.

Audit engagement letter

B.

Risk profile

C.

IT risk register

D.

Change control documentation

Full Access
Question # 276

A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?

A.

The user requirements were not documented.

B.

Payroll files were not under the control of a librarian.

C.

The programmer had access to the production programs.

D.

The programmer did not involve the user in testing.

Full Access
Question # 277

A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:

A.

obtain management approval for policy exception.

B.

develop an improved password software routine.

C.

select another application with strong password controls.

D.

continue the implementation with no changes.

Full Access
Question # 278

Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?

A.

Analyzing risk appetite and tolerance levels

B.

Assessing identified risk and recording results in the risk register

C.

Evaluating risk scenarios and assessing current controls

D.

Reviewing guidance from industry best practices and standards

Full Access
Question # 279

A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?

A.

Increase in compliance breaches

B.

Increase in loss event impact

C.

Increase in residual risk

D.

Increase in customer complaints

Full Access
Question # 280

An organization is making significant changes to an application. At what point should the application risk profile be updated?

A.

After user acceptance testing (UAT)

B.

Upon release to production

C.

During backlog scheduling

D.

When reviewing functional requirements

Full Access
Question # 281

A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?

A.

Report it to the chief risk officer.

B.

Advise the employee to forward the email to the phishing team.

C.

follow incident reporting procedures.

D.

Advise the employee to permanently delete the email.

Full Access
Question # 282

Deviation from a mitigation action plan's completion date should be determined by which of the following?

A.

Change management as determined by a change control board

B.

Benchmarking analysis with similar completed projects

C.

Project governance criteria as determined by the project office

D.

The risk owner as determined by risk management processes

Full Access
Question # 283

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

A.

update the risk rating.

B.

reevaluate inherent risk.

C.

develop new risk scenarios.

D.

implement additional controls.

Full Access
Question # 284

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

A.

identifying risk scenarios.

B.

determining the risk strategy.

C.

calculating impact and likelihood.

D.

completing the controls catalog.

Full Access
Question # 285

Which of the following will BEST support management repotting on risk?

A.

Risk policy requirements

B.

A risk register

C.

Control self-assessment

D.

Key performance Indicators

Full Access
Question # 286

Which of the following would qualify as a key performance indicator (KPI)?

A.

Aggregate risk of the organization

B.

Number of identified system vulnerabilities

C.

Number of exception requests processed in the past 90 days

D.

Number of attacks against the organization's website

Full Access
Question # 287

The risk appetite for an organization could be derived from which of the following?

A.

Cost of controls

B.

Annual loss expectancy (ALE)

C.

Inherent risk

D.

Residual risk

Full Access
Question # 288

Which of the following statements in an organization's current risk profile report is cause for further action by senior management?

A.

Key performance indicator (KPI) trend data is incomplete.

B.

New key risk indicators (KRIs) have been established.

C.

Key performance indicators (KPIs) are outside of targets.

D.

Key risk indicators (KRIs) are lagging.

Full Access
Question # 289

Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?

A.

Unencrypted data

B.

Lack of redundant circuits

C.

Low bandwidth connections

D.

Data integrity

Full Access
Question # 290

IT disaster recovery point objectives (RPOs) should be based on the:

A.

maximum tolerable downtime.

B.

maximum tolerable loss of data.

C.

need of each business unit.

D.

type of business.

Full Access
Question # 291

Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?

A.

Self-assessments by process owners

B.

Mitigation plan progress reports

C.

Risk owner attestation

D.

Change in the level of residual risk

Full Access
Question # 292

An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:

A.

mitigation.

B.

avoidance.

C.

transfer.

D.

acceptance.

Full Access
Question # 293

When testing the security of an IT system, il is MOST important to ensure that;

A.

tests are conducted after business hours.

B.

operators are unaware of the test.

C.

external experts execute the test.

D.

agreement is obtained from stakeholders.

Full Access
Question # 294

A risk practitioner has just learned about new done FIRST?

A.

Notify executive management.

B.

Analyze the impact to the organization.

C.

Update the IT risk register.

D.

Design IT risk mitigation plans.

Full Access
Question # 295

An organization's financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?

A.

IT risk manager

B.

IT system owner

C.

Information security manager

D.

Business owner

Full Access
Question # 296

When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?

A.

Risk action plans and associated owners

B.

Recent audit and self-assessment results

C.

Potential losses compared to treatment cost

D.

A list of assets exposed to the highest risk

Full Access
Question # 297

Who is PRIMARILY accountable for risk treatment decisions?

A.

Risk owner

B.

Business manager

C.

Data owner

D.

Risk manager

Full Access
Question # 298

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

A.

Risk and control ownership

B.

Senior management participation

C.

Business unit support

D.

Risk nomenclature and taxonomy

Full Access
Question # 299

Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?

A.

Quantitative analysis might not be possible.

B.

Risk factors might not be relevant to the organization

C.

Implementation costs might increase.

D.

Inherent risk might not be considered.

Full Access
Question # 300

The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:

A.

the risk strategy is appropriate

B.

KRIs and KPIs are aligned

C.

performance of controls is adequate

D.

the risk monitoring process has been established

Full Access
Question # 301

The FIRST task when developing a business continuity plan should be to:

A.

determine data backup and recovery availability at an alternate site.

B.

identify critical business functions and resources.

C.

define roles and responsibilities for implementation.

D.

identify recovery time objectives (RTOs) for critical business applications.

Full Access
Question # 302

Which of the following is MOST important to sustainable development of secure IT services?

A.

Security training for systems development staff

B.

\Well-documented business cases

C.

Security architecture principles

D.

Secure coding practices

Full Access
Question # 303

An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?

A.

Implement IT systems in alignment with business objectives.

B.

Review metrics and key performance indicators (KPIs).

C.

Review design documentation of IT systems.

D.

Evaluate compliance with legal and regulatory requirements.

Full Access
Question # 304

The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:

A.

ensure policy and regulatory compliance.

B.

assess the proliferation of new threats.

C.

verify Internet firewall control settings.

D.

identify vulnerabilities in the system.

Full Access
Question # 305

Which of the following provides The MOST useful information when determining a risk management program's maturity level?

A.

Risk assessment results

B.

A recently reviewed risk register

C.

Key performance indicators (KPIs)

D.

The organization's risk framework

Full Access
Question # 306

Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?

A.

Providing oversight of risk management processes

B.

Implementing processes to detect and deter fraud

C.

Ensuring that risk and control assessments consider fraud

D.

Monitoring the results of actions taken to mitigate fraud

Full Access
Question # 307

Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?

A.

Defining expectations in the enterprise risk policy

B.

Increasing organizational resources to mitigate risks

C.

Communicating external audit results

D.

Avoiding risks that could materialize into substantial losses

Full Access
Question # 308

When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:

A.

risk map

B.

cause-and-effect diagram

C.

maturity model

D.

technology strategy plan.

Full Access
Question # 309

An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?

A.

External resources may need to be involved.

B.

Data privacy regulations may be violated.

C.

Recovery costs may increase significantly.

D.

Service interruptions may be longer than anticipated.

Full Access
Question # 310

For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?

A.

Temporarily increase the risk threshold.

B.

Suspend processing to investigate the problem.

C.

Initiate a feasibility study for a new application.

D.

Conduct a root-cause analysis.

Full Access
Question # 311

Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?

A.

Management has not determined a final implementation date.

B.

Management has not completed an early mitigation milestone.

C.

Management has not secured resources for mitigation activities.

D.

Management has not begun the implementation.

Full Access
Question # 312

Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?

A.

To allocate budget for resolution of risk issues

B.

To determine if new risk scenarios have been identified

C.

To ensure the project timeline is on target

D.

To track the status of risk mitigation actions

Full Access
Question # 313

Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?

A.

Identify information security controls in the requirements analysis

B.

Identify key risk indicators (KRIs) as process output.

C.

Design key performance indicators (KPIs) for security in system specifications.

D.

Include information security control specifications in business cases.

Full Access
Question # 314

During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?

A.

Implement compensating controls to reduce residual risk

B.

Escalate the issue to senior management

C.

Discuss risk mitigation options with the risk owner.

D.

Certify the control after documenting the concern.

Full Access
Question # 315

Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?

A.

Cyber insurance

B.

Data backups

C.

Incident response plan

D.

Key risk indicators (KRIs)

Full Access
Question # 316

Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?

A.

Recommend the IT department remove access to the cloud services.

B.

Engage with the business area managers to review controls applied.

C.

Escalate to the risk committee.

D.

Recommend a risk assessment be conducted.

Full Access
Question # 317

Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?

A.

Business context

B.

Risk tolerance level

C.

Resource requirements

D.

Benchmarking information

Full Access
Question # 318

The PRIMARY basis for selecting a security control is:

A.

to achieve the desired level of maturity.

B.

the materiality of the risk.

C.

the ability to mitigate risk.

D.

the cost of the control.

Full Access
Question # 319

An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?

A.

Feedback from end users

B.

Results of a benchmark analysis

C.

Recommendations from internal audit

D.

Prioritization from business owners

Full Access
Question # 320

To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?

A.

During the business requirement definitions phase

B.

Before periodic steering committee meetings

C.

At each stage of the development life cycle

D.

During the business case development

Full Access
Question # 321

Before implementing instant messaging within an organization using a public solution, which of the following should be in place to mitigate data leakage risk?

A.

A data extraction tool

B.

An access control list

C.

An intrusion detection system (IDS)

D.

An acceptable usage policy

Full Access
Question # 322

Which of the following methods would BEST contribute to identifying obscure risk scenarios?

A.

Brainstorming sessions

B.

Control self-assessments

C.

Vulnerability analysis

D.

Monte Carlo analysis

Full Access
Question # 323

IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:

A.

the cost associated with each control.

B.

historical risk assessments.

C.

key risk indicators (KRls).

D.

information from the risk register.

Full Access
Question # 324

A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:

A.

update the risk register to reflect the correct level of residual risk.

B.

ensure risk monitoring for the project is initiated.

C.

conduct and document a business impact analysis (BIA).

D.

verify cost-benefit of the new controls being implemented.

Full Access
Question # 325

Which of the following BEST supports the communication of risk assessment results to stakeholders?

A.

Monitoring of high-risk areas

B.

Classification of risk profiles

C.

Periodic review of the risk register

D.

Assignment of risk ownership

Full Access
Question # 326

Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?

A.

Qualitative measures for potential loss events

B.

Changes in owners for identified IT risk scenarios

C.

Changes in methods used to calculate probability

D.

Frequent use of risk acceptance as a treatment option

Full Access
Question # 327

The GREATEST concern when maintaining a risk register is that:

A.

impacts are recorded in qualitative terms.

B.

executive management does not perform periodic reviews.

C.

IT risk is not linked with IT assets.

D.

significant changes in risk factors are excluded.

Full Access
Question # 328

The annualized loss expectancy (ALE) method of risk analysis:

A.

helps in calculating the expected cost of controls

B.

uses qualitative risk rankings such as low. medium and high.

C.

can be used m a cost-benefit analysts

D.

can be used to determine the indirect business impact.

Full Access
Question # 329

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

A.

Risk tolerance

B.

Risk appetite

C.

Risk awareness

D.

Risk policy

Full Access
Question # 330

Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?

A.

Obtaining funding support

B.

Defining the risk assessment scope

C.

Selecting the risk assessment framework

D.

Establishing inherent risk

Full Access
Question # 331

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

A.

risk mitigation approach

B.

cost-benefit analysis.

C.

risk assessment results.

D.

vulnerability assessment results

Full Access
Question # 332

Which of the following BEST indicates that an organizations risk management program is effective?

A.

Fewer security incidents have been reported.

B.

The number of audit findings has decreased.

C.

Residual risk is reduced.

D.

inherent risk Is unchanged.

Full Access
Question # 333

Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization's IT systems via personal or public computers?

A.

Risk appetite

B.

Inherent risk

C.

Key risk indicator (KRI)

D.

Risk tolerance

Full Access
Question # 334

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

A.

avoided.

B.

accepted.

C.

mitigated.

D.

transferred.

Full Access
Question # 335

Which of the following is the BEST way to ensure ongoing control effectiveness?

A.

Establishing policies and procedures

B.

Periodically reviewing control design

C.

Measuring trends in control performance

D.

Obtaining management control attestations

Full Access
Question # 336

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

A.

To deliver projects on time and on budget

B.

To assess inherent risk

C.

To include project risk in the enterprise-wide IT risk profit.

D.

To assess risk throughout the project

Full Access
Question # 337

Which of the following is MOST critical to the design of relevant risk scenarios?

A.

The scenarios are based on past incidents.

B.

The scenarios are linked to probable organizational situations.

C.

The scenarios are mapped to incident management capabilities.

D.

The scenarios are aligned with risk management capabilities.

Full Access
Question # 338

Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?

A.

Significant increases in risk mitigation budgets

B.

Large fluctuations in risk ratings between assessments

C.

A steady increase in the time to recover from incidents

D.

A large number of control exceptions

Full Access
Question # 339

Who should be responsible for implementing and maintaining security controls?

A.

End user

B.

Internal auditor

C.

Data owner

D.

Data custodian

Full Access
Question # 340

Which of the following is the BEST way to identify changes in the risk profile of an organization?

A.

Monitor key risk indicators (KRIs).

B.

Monitor key performance indicators (KPIs).

C.

Interview the risk owner.

D.

Conduct a gap analysis

Full Access
Question # 341

A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?

A.

The audit had a broader scope than the CSA.

B.

The CSA was not sample-based.

C.

The CSA did not test control effectiveness.

D.

The CSA was compliance-based, while the audit was risk-based.

Full Access
Question # 342

Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?

A.

Adoption of industry best practices

B.

Involvement of stakeholders in risk assessment

C.

Review of risk scenarios by independent parties

D.

Documentation of potential risk in business cases

Full Access
Question # 343

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

A.

Methods of attack progression

B.

Losses incurred by industry peers

C.

Most recent antivirus scan reports

D.

Potential impact of events

Full Access
Question # 344

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

A.

risk appetite.

B.

security policies

C.

process maps.

D.

risk tolerance level

Full Access
Question # 345

Which of the following is the MAIN reason for analyzing risk scenarios?

A.

Identifying additional risk scenarios

B.

Updating the heat map

C.

Assessing loss expectancy

D.

Establishing a risk appetite

Full Access
Question # 346

A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:

A.

mitigated

B.

accepted

C.

avoided

D.

deferred

Full Access
Question # 347

Which of the following BEST enables detection of ethical violations committed by employees?

A.

Transaction log monitoring

B.

Access control attestation

C.

Periodic job rotation

D.

Whistleblower program

Full Access
Question # 348

Which of the following should be the PRIMARY driver for the prioritization of risk responses?

A.

Residual risk

B.

Risk appetite

C.

Mitigation cost

D.

Inherent risk

Full Access
Question # 349

When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?

A.

Leveraging business risk professionals

B.

Relying on generic IT risk scenarios

C.

Describing IT risk in business terms

D.

Using a common risk taxonomy

Full Access
Question # 350

Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?

A.

Standards-based policies

B.

Audit readiness

C.

Efficient operations

D.

Regulatory compliance

Full Access
Question # 351

When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?

A.

Before defining a framework

B.

During the risk assessment

C.

When evaluating risk response

D.

When updating the risk register

Full Access
Question # 352

The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:

A.

identify specific project risk.

B.

obtain a holistic view of IT strategy risk.

C.

understand risk associated with complex processes.

D.

incorporate subject matter expertise.

Full Access
Question # 353

While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:

A.

control is ineffective and should be strengthened

B.

risk is inefficiently controlled.

C.

risk is efficiently controlled.

D.

control is weak and should be removed.

Full Access
Question # 354

Which of the following is the MOST important consideration when selecting digital signature software?

A.

Availability

B.

Nonrepudiation

C.

Accuracy

D.

Completeness

Full Access
Question # 355

An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?

A.

Risk profile

B.

Risk capacity

C.

Risk indicators

D.

Risk tolerance

Full Access
Question # 356

An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?

A.

Obtain adequate cybersecurity insurance coverage.

B.

Ensure business continuity assessments are up to date.

C.

Adjust the organization's risk appetite and tolerance.

D.

Obtain certification to a global information security standard.

Full Access
Question # 357

Which of the following is the BEST method to track asset inventory?

A.

Periodic asset review by management

B.

Asset registration form

C.

IT resource budgeting process

D.

Automated asset management software

Full Access
Question # 358

The BEST way for management to validate whether risk response activities have been completed is to review:

A.

the risk register change log.

B.

evidence of risk acceptance.

C.

control effectiveness test results.

D.

control design documentation.

Full Access
Question # 359

Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?

A.

Number of projects going live without a security review

B.

Number of employees completing project-specific security training

C.

Number of security projects started in core departments

D.

Number of security-related status reports submitted by project managers

Full Access
Question # 360

Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?

A.

Obtain objective assessment of the control environment.

B.

Ensure the risk profile is defined and communicated.

C.

Validate the threat management process.

D.

Obtain an objective view of process gaps and systemic errors.

Full Access
Question # 361

A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:

A.

mature

B.

ineffective.

C.

optimized.

D.

inefficient.

Full Access
Question # 362

A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?

A.

Re-evaluate the organization's risk appetite.

B.

Outsource the cybersecurity function.

C.

Purchase cybersecurity insurance.

D.

Review cybersecurity incident response procedures.

Full Access
Question # 363

Which of the following BEST enables a risk practitioner to identify the consequences of losing critical resources due to a disaster?

A.

Risk management action plans

B.

Business impact analysis (BIA)

C.

What-if technique

D.

Tabletop exercise results

Full Access
Question # 364

Which of the following would BEST indicate to senior management that IT processes are improving?

A.

Changes in the number of security exceptions

B.

Changes to the structure of the risk register

C.

Changes in the number of intrusions detected

D.

Changes in the position in the maturity model

Full Access
Question # 365

Which of the following activities should only be performed by the third line of defense?

A.

Operating controls for risk mitigation

B.

Testing the effectiveness and efficiency of internal controls

C.

Providing assurance on risk management processes

D.

Recommending risk treatment options

Full Access
Question # 366

A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?

A.

Subscribe to threat intelligence to monitor external attacks.

B.

Apply patches for a newer version of the application.

C.

Segment the application within the existing network.

D.

Increase the frequency of regular system and data backups.

Full Access
Question # 367

Which of the following BEST enables an organization to address risk associated with technical complexity?

A.

Documenting system hardening requirements

B.

Minimizing dependency on technology

C.

Aligning with a security architecture

D.

Establishing configuration guidelines

Full Access
Question # 368

Which of the following BEST supports the management of identified risk scenarios?

A.

Collecting risk event data

B.

Maintaining a risk register

C.

Using key risk indicators (KRIs)

D.

Defining risk parameters

Full Access
Question # 369

An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?

A.

Database manager

B.

Public relations manager

C.

Data privacy manager

D.

Business manager

Full Access
Question # 370

Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?

A.

Risk and control self-assessment (CSA) reports

B.

Information generated by the systems

C.

Control environment narratives

D.

Confirmation from industry peers

Full Access
Question # 371

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Full Access
Question # 372

An organization has allowed several employees to retire early in order to avoid layoffs Many of these employees have been subject matter experts for critical assets Which type of risk is MOST likely to materialize?

A.

Confidentiality breach

B.

Institutional knowledge loss

C.

Intellectual property loss

D.

Unauthorized access

Full Access
Question # 373

Which of the following is the MOST important document regarding the treatment of sensitive data?

A.

Organization risk profile

B.

Information classification policy

C.

Encryption policy

D.

Digital rights management policy

Full Access
Question # 374

A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?

A.

Corrective

B.

Detective

C.

Deterrent

D.

Preventative

Full Access
Question # 375

Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?

A.

Corrective

B.

Preventive

C.

Detective

D.

Deterrent

Full Access
Question # 376

Which of the following should be the starting point when performing a risk analysis for an asset?

A.

Assess risk scenarios.

B.

Update the risk register.

C.

Evaluate threats.

D.

Assess controls.

Full Access
Question # 377

Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?

A.

Key audit findings

B.

Treatment plan status

C.

Performance indicators

D.

Risk scenario results

Full Access
Question # 378

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

A.

The percentage of servers with allowed patching exceptions

B.

The number of servers with local credentials to install patches

C.

The percentage of servers patched within required service level agreements

D.

The number of servers running the software patching service

Full Access
Question # 379

An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?

A.

Most recent IT audit report results

B.

Replacement cost of IT assets

C.

Current annualized loss expectancy report

D.

Cyber insurance industry benchmarking report

Full Access
Question # 380

Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?

A.

Providing risk awareness training for business units

B.

Obtaining input from business management

C.

Understanding the business controls currently in place

D.

Conducting a business impact analysis (BIA)

Full Access
Question # 381

Which of the following should be of GREATEST concern lo a risk practitioner reviewing the implementation of an emerging technology?

A.

Lack of alignment to best practices

B.

Lack of risk assessment

C.

Lack of risk and control procedures

D.

Lack of management approval

Full Access
Question # 382

Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?

A.

Stakeholder preferences

B.

Contractual requirements

C.

Regulatory requirements

D.

Management assertions

Full Access
Question # 383

A risk practitioner has been asked to advise management on developing a log collection and correlation strategy. Which of the following should be the MOST important consideration when developing this strategy?

A.

Ensuring time synchronization of log sources.

B.

Ensuring the inclusion of external threat intelligence log sources.

C.

Ensuring the inclusion of all computing resources as log sources.

D.

Ensuring read-write access to all log sources

Full Access
Question # 384

Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?

A.

Aligning IT with short-term and long-term goals of the organization

B.

Ensuring the IT budget and resources focus on risk management

C.

Ensuring senior management's primary focus is on the impact of identified risk

D.

Prioritizing internal departments that provide service to customers

Full Access
Question # 385

Which of the following will BEST help to improve an organization's risk culture?

A.

Maintaining a documented risk register

B.

Establishing a risk awareness program

C.

Rewarding employees for reporting security incidents

D.

Allocating resources for risk remediation

Full Access
Question # 386

What is the PRIMARY reason to periodically review key performance indicators (KPIs)?

A.

Ensure compliance.

B.

Identify trends.

C.

Promote a risk-aware culture.

D.

Optimize resources needed for controls

Full Access
Question # 387

Which of the following is the BEST risk management approach for the strategic IT planning process?

A.

Key performance indicators (KPIs) are established to track IT strategic initiatives.

B.

The IT strategic plan is reviewed by the chief information security officer (CISO) and enterprise risk management (ERM).

C.

The IT strategic plan is developed from the organization-wide risk management plan.

D.

Risk scenarios associated with IT strategic initiatives are identified and assessed.

Full Access
Question # 388

Which of the following is the PRIMARY role of a data custodian in the risk management process?

A.

Performing periodic data reviews according to policy

B.

Reporting and escalating data breaches to senior management

C.

Being accountable for control design

D.

Ensuring data is protected according to the classification

Full Access
Question # 389

Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?

A.

The criticality of the asset

B.

The vulnerability profile of the asset

C.

The monetary value of the asset

D.

The size of the asset's user base

Full Access
Question # 390

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.

B.

Implement a key performance indicator (KPI) to monitor the existing control performance.

C.

Accept the residual risk in its entirety and obtain executive management approval.

D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.

Full Access
Question # 391

From a risk management perspective, the PRIMARY objective of using maturity models is to enable:

A.

solution delivery.

B.

resource utilization.

C.

strategic alignment.

D.

performance evaluation.

Full Access
Question # 392

A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?

A.

Identify changes in risk factors and initiate risk reviews.

B.

Engage an external consultant to redesign the risk management process.

C.

Outsource the process for updating the risk register.

D.

Implement a process improvement and replace the old risk register.

Full Access
Question # 393

Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?

A.

Risk appetite

B.

Control cost

C.

Control effectiveness

D.

Risk tolerance

Full Access
Question # 394

Which organizational role should be accountable for ensuring information assets are appropriately classified?

A.

Data protection officer

B.

Chief information officer (CIO)

C.

Information asset custodian

D.

Information asset owner

Full Access
Question # 395

Which of the following is MOST important to the integrity of a security log?

A.

Least privilege access

B.

Inability to edit

C.

Ability to overwrite

D.

Encryption

Full Access
Question # 396

Which of the following is MOST useful when communicating risk to management?

A.

Risk policy

B.

Audit report

C.

Risk map

D.

Maturity model

Full Access
Question # 397

Which of the following should be the MOST important consideration when performing a vendor risk assessment?

A.

Results of the last risk assessment of the vendor

B.

Inherent risk of the business process supported by the vendor

C.

Risk tolerance of the vendor

D.

Length of time since the last risk assessment of the vendor

Full Access
Question # 398

Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?

A.

Failed login attempts

B.

Simulating a denial of service attack

C.

Absence of IT audit findings

D.

Penetration test

Full Access
Question # 399

An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:

A.

reduce the likelihood of future events

B.

restore availability

C.

reduce the impact of future events

D.

address the root cause

Full Access
Question # 400

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

A.

To provide a basis for determining the criticality of risk mitigation controls

B.

To provide early warning signs of a potential change in risk level

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide insight into the effectiveness of the intemnal control environment

Full Access
Question # 401

An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?

A.

Require the vendor to degauss the hard drives

B.

Implement an encryption policy for the hard drives.

C.

Require confirmation of destruction from the IT manager.

D.

Use an accredited vendor to dispose of the hard drives.

Full Access
Question # 402

A violation of segregation of duties is when the same:

A.

user requests and tests the change prior to production.

B.

user authorizes and monitors the change post-implementation.

C.

programmer requests and tests the change prior to production.

D.

programmer writes and promotes code into production.

Full Access
Question # 403

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

A.

Educating employees on what needs to be kept confidential

B.

Implementing a data loss prevention (DLP) solution

C.

Taking punitive action against employees who expose confidential data

D.

Requiring employees to sign nondisclosure agreements

Full Access
Question # 404

Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization's current risk profile?

A.

Hire consultants specializing m the new technology.

B.

Review existing risk mitigation controls.

C.

Conduct a gap analysis.

D.

Perform a risk assessment.

Full Access
Question # 405

Which of the following is the MOST significant indicator of the need to perform a penetration test?

A.

An increase in the number of high-risk audit findings

B.

An increase in the number of security incidents

C.

An increase in the percentage of turnover in IT personnel

D.

An increase in the number of infrastructure changes

Full Access
Question # 406

Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?

A.

impact due to failure of control

B.

Frequency of failure of control

C.

Contingency plan for residual risk

D.

Cost-benefit analysis of automation

Full Access
Question # 407

An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?

A.

Determine whether the impact is outside the risk appetite.

B.

Report the ineffective control for inclusion in the next audit report.

C.

Request a formal acceptance of risk from senior management.

D.

Deploy a compensating control to address the identified deficiencies.

Full Access
Question # 408

During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?

A.

Report the infraction.

B.

Perform a risk assessment.

C.

Conduct risk awareness training.

D.

Discontinue the process.

Full Access
Question # 409

An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?

A.

Secure encryption protocols are utilized.

B.

Multi-factor authentication is set up for users.

C.

The solution architecture is approved by IT.

D.

A risk transfer clause is included in the contact

Full Access
Question # 410

An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?

A.

Accept the risk of using the production data to ensure accurate results.

B.

Assess the risk of using production data for testing before making a decision.

C.

Benchmark against what peer organizations are doing with POC testing environments.

D.

Deny the request, as production data should not be used for testing purposes.

Full Access
Question # 411

An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?

A.

Lack of cross-functional risk assessment workshops within the organization

B.

Lack of common understanding of the organization's risk culture

C.

Lack of quantitative methods to aggregate the total risk exposure

D.

Lack of an integrated risk management system to aggregate risk scenarios

Full Access
Question # 412

What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?

A.

Creating metrics to report the number of security incidents

B.

Hiring subject matter experts for the program

C.

Establishing a budget for additional resources

D.

Assigning clear ownership of the program

Full Access
Question # 413

A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

A.

Conduct a gap analysis.

B.

Terminate the outsourcing agreement.

C.

Identify compensating controls.

D.

Transfer risk to the third party.

Full Access
Question # 414

Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?

A.

Aligning business unit risk responses to organizational priorities

B.

Determining attack likelihood per business unit

C.

Adjusting business unit risk tolerances

D.

Customizing incident response plans for each business unit

Full Access
Question # 415

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

A.

Average time to implement patches after vendor release

B.

Number of patches tested prior to deployment

C.

Increase in the frequency of patches deployed into production

D.

Percent of patches implemented within established timeframe

Full Access
Question # 416

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

A.

To provide insight into the effectiveness of the internal control environment

B.

To provide a basis for determining the criticality of risk mitigation controls

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide early warning signs of a potential change in risk level

Full Access
Question # 417

Which of the following is the MOST essential factor for managing risk in a highly dynamic environment?

A.

Ongoing sharing of information among industry peers

B.

Obtaining support from senior leadership

C.

Adhering to industry-recognized risk management standards

D.

Implementing detection and response measures

Full Access
Question # 418

The PRIMARY focus of an ongoing risk awareness program should be to:

A.

enable better risk-based decisions.

B.

define appropriate controls to mitigate risk.

C.

determine impact of risk scenarios.

D.

expand understanding of risk indicators.

Full Access
Question # 419

Which of the following is MOST important to include in a risk assessment of an emerging technology?

A.

Risk response plans

B.

Risk and control ownership

C.

Key controls

D.

Impact and likelihood ratings

Full Access
Question # 420

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Full Access
Question # 421

Who is the MOST appropriate owner for newly identified IT risk?

A.

The manager responsible for IT operations that will support the risk mitigation efforts

B.

The individual with authority to commit organizational resources to mitigate the risk

C.

A project manager capable of prioritizing the risk remediation efforts

D.

The individual with the most IT risk-related subject matter knowledge

Full Access
Question # 422

Which of the following is the MAIN reason to continuously monitor IT-related risk?

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Full Access
Question # 423

Which of the following is the MOST effective key performance indicator (KPI) for change management?

A.

Percentage of changes with a fallback plan

B.

Number of changes implemented

C.

Percentage of successful changes

D.

Average time required to implement a change

Full Access
Question # 424

Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?

A.

Digital signatures

B.

Encrypted passwords

C.

One-time passwords

D.

Digital certificates

Full Access
Question # 425

Which of the following would BEST ensure that identified risk scenarios are addressed?

A.

Reviewing the implementation of the risk response

B.

Creating a separate risk register for key business units

C.

Performing real-time monitoring of threats

D.

Performing regular risk control self-assessments

Full Access
Question # 426

During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?

A.

Describe IT risk scenarios in terms of business risk.

B.

Recommend the formation of an executive risk council to oversee IT risk.

C.

Provide an estimate of IT system downtime if IT risk materializes.

D.

Educate business executives on IT risk concepts.

Full Access
Question # 427

During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:

A.

compensating controls are in place.

B.

a control mitigation plan is in place.

C.

risk management is effective.

D.

residual risk is accepted.

Full Access
Question # 428

Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?

A.

Optimize the control environment.

B.

Realign risk appetite to the current risk level.

C.

Decrease the number of related risk scenarios.

D.

Reduce the risk management budget.

Full Access
Question # 429

Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?

A.

Updating multi-factor authentication

B.

Monitoring key access control performance indicators

C.

Analyzing access control logs for suspicious activity

D.

Revising the service level agreement (SLA)

Full Access
Question # 430

Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:

A.

minimize the number of risk scenarios for risk assessment.

B.

aggregate risk scenarios identified across different business units.

C.

build a threat profile of the organization for management review.

D.

provide a current reference to stakeholders for risk-based decisions.

Full Access
Question # 431

Which of the following is the MOST important element of a successful risk awareness training program?

A.

Customizing content for the audience

B.

Providing incentives to participants

C.

Mapping to a recognized standard

D.

Providing metrics for measurement

Full Access
Question # 432

Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?

A.

Identify the potential risk.

B.

Monitor employee usage.

C.

Assess the potential risk.

D.

Develop risk awareness training.

Full Access
Question # 433

Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?

A.

Perform an m-depth code review with an expert

B.

Validate functionality by running in a test environment

C.

Implement a service level agreement.

D.

Utilize the change management process.

Full Access
Question # 434

The PRIMARY advantage of implementing an IT risk management framework is the:

A.

establishment of a reliable basis for risk-aware decision making.

B.

compliance with relevant legal and regulatory requirements.

C.

improvement of controls within the organization and minimized losses.

D.

alignment of business goals with IT objectives.

Full Access
Question # 435

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

A.

Cost of offsite backup premises

B.

Cost of downtime due to a disaster

C.

Cost of testing the business continuity plan

D.

Response time of the emergency action plan

Full Access
Question # 436

Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?

A.

Assess the vulnerability management process.

B.

Conduct a control serf-assessment.

C.

Conduct a vulnerability assessment.

D.

Reassess the inherent risk of the target.

Full Access
Question # 437

A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?

A.

The organization's strategic risk management projects

B.

Senior management roles and responsibilities

C.

The organizations risk appetite and tolerance

D.

Senior management allocation of risk management resources

Full Access
Question # 438

IT risk assessments can BEST be used by management:

A.

for compliance with laws and regulations

B.

as a basis for cost-benefit analysis.

C.

as input for decision-making

D.

to measure organizational success.

Full Access
Question # 439

Who should be accountable for ensuring effective cybersecurity controls are established?

A.

Risk owner

B.

Security management function

C.

IT management

D.

Enterprise risk function

Full Access
Question # 440

A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?

A.

Business continuity director

B.

Disaster recovery manager

C.

Business application owner

D.

Data center manager

Full Access
Question # 441

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

A.

Performing a benchmark analysis and evaluating gaps

B.

Conducting risk assessments and implementing controls

C.

Communicating components of risk and their acceptable levels

D.

Participating in peer reviews and implementing best practices

Full Access
Question # 442

Which of the following would be MOST helpful when estimating the likelihood of negative events?

A.

Business impact analysis

B.

Threat analysis

C.

Risk response analysis

D.

Cost-benefit analysis

Full Access
Question # 443

A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?

A.

Document the finding in the risk register.

B.

Invoke the incident response plan.

C.

Re-evaluate key risk indicators.

D.

Modify the design of the control.

Full Access
Question # 444

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Full Access