A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner
recommend be done NEXT?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?
The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:
A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?
A maturity model will BEST indicate:
A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
Which of the following is the MOST important consideration when selecting key risk indicators (KRIs) to monitor risk trends over time?
Which of the following is the BEST way to validate whether controls to reduce user device vulnerabilities have been implemented according to management's action plan?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
Which of the following is the BEST indication of the effectiveness of a business continuity program?
The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?
Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?
Which of the following would BEST help to ensure that identified risk is efficiently managed?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
Which of the following is the PRIMARY objective of a risk awareness program?
Which of the following will BEST help to ensure that information system controls are effective?
In the three lines of defense model, a PRIMARY objective of the second line is to:
Which of the following should be the PRIMARY basis for prioritizing risk responses?
Which of the following BEST enables an organization to determine whether risk management is aligned with its goals and objectives?
Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
The BEST metric to demonstrate that servers are configured securely is the total number of servers:
Which of the following is MOST important for managing ethical risk?
Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?
Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
A risk practitioner has learned that the number of emergency change management tickets without subsequent approval has doubled from the same period of the previous year. Which of the following is the MOST important action for the risk practitioner to take?
Which of the following should an organization perform to forecast the effects of a disaster?
Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
The PRIMARY objective of a risk identification process is to:
A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner's BEST course of action?
What are the MOST essential attributes of an effective Key control indicator (KCI)?
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Isaca Free Exams |
---|
![]() |