All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Which of the following is a risk practitioner's BEST course of action upon learning that a control under internal review may no longer be necessary?
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
To enable effective risk governance, it is MOST important for senior management to:
Which of the following is MOST important to determine as a result of a risk assessment?
Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
Which of the following is MOST important to consider when determining risk appetite?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
The MAIN reason for prioritizing IT risk responses is to enable an organization to:
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
The BEST way to improve a risk register is to ensure the register:
Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?
Winch of the following is the BEST evidence of an effective risk treatment plan?
Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?
When testing the security of an IT system, il is MOST important to ensure that;
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
An organization wants to assess the maturity of its internal control environment. The FIRST step should be to:
A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?
Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?
The percentage of unpatched systems is a:
A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?
Which of the following roles should be assigned accountability for monitoring risk levels?
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:
The MOST effective approach to prioritize risk scenarios is by:
Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?
Which of the following is the PRIMARY accountability for a control owner?
Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?
Which of the following would BEST facilitate the maintenance of data classification requirements?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
Which of the following is the MAIN reason for analyzing risk scenarios?
Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?
Which of the following is the BEST indicator of the effectiveness of IT risk management processes?
Which of the following is MOST important for a risk practitioner to verify when periodically reviewing risk response action plans?
Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?
Determining if organizational risk is tolerable requires:
Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?
An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?
An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
Isaca Free Exams |
---|
![]() |