Which of the following is the BEST response when a potential IT control deficiency has been identified?
IT disaster recovery point objectives (RPOs) should be based on the:
The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following provides the MOST reliable evidence of a control's effectiveness?
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
Which of the following would BEST help to ensure that identified risk is efficiently managed?
Which of the following would BEST help to ensure that suspicious network activity is identified?
Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?
Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?
Which of the following BEST reduces the probability of laptop theft?
Which of the following is MOST important to the successful development of IT risk scenarios?
Which of the following is the BEST method to track asset inventory?
Which of the following is MOST influential when management makes risk response decisions?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
Which of the following will help ensure the elective decision-making of an IT risk management committee?
A contract associated with a cloud service provider MUST include:
Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?
Which of the following would be MOST beneficial as a key risk indicator (KRI)?
An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?
Which of the following presents the GREATEST privacy risk related to personal data processing for a global organization?
Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?
Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?
Which of the following BEST helps to ensure disaster recovery staff members
are able to complete their assigned tasks effectively during a disaster?
Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?
An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:
The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
Which of the following is the BEST indicator of the effectiveness of a control?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Which of the following is the GREATEST impact of implementing a risk mitigation strategy?
Which of the following is the BEST recommendation when a key risk indicator (KRI) is generating an excessive volume of events?
Which of the following sources is MOST relevant to reference when updating security awareness training materials?
A technology company is developing a strategic artificial intelligence (Al)-driven application that has high potential business value. At what point should the enterprise risk profile be updated?
Which of the following BEST facilitates the development of relevant risk scenarios?
Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.
The BEST way to test the operational effectiveness of a data backup procedure is to:
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
A MAJOR advantage of using key risk indicators (KRis) is that (hey
Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Isaca Free Exams |
---|
![]() |