An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
Which of the following is the MOST important outcome of a business impact analysis (BIA)?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?
Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?
Which of the following is the BEST approach for selecting controls to minimize risk?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?
Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
Which of the following is MOST helpful to understand the consequences of an IT risk event?
Which of the following sources is MOST relevant to reference when updating security awareness training materials?
The objective of aligning mitigating controls to risk appetite is to ensure that:
Which of the blowing is MOST important when implementing an organization s security policy?
Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?
Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Isaca Free Exams |
---|
![]() |