Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?
When is the BEST to identify risk associated with major project to determine a mitigation plan?
Which of the following is the PRIMARY benefit of implementing key control indicators (KCIs)?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?
Which of the following is MOST important for an organization to consider when developing its IT strategy?
A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner's GREATEST concern?
To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:
An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?
The PRIMARY focus of an ongoing risk awareness program should be to:
Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?
Which of the following is the GREATEST benefit of centralizing IT systems?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Which of the following is MOST important for a risk practitioner to confirm once a risk action plan has been completed?
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?
The MAIN purpose of conducting a control self-assessment (CSA) is to:
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:
Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?
Who is the BEST person to the employee personal data?
An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
Which of the following is the PRIMARY purpose of a risk register?
Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?
Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
The MAJOR reason to classify information assets is
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
Which of the following BEST indicates that security requirements have been incorporated into the system development life cycle (SDLC)?
The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:
Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:
When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:
Which of the following controls are BEST strengthened by a clear organizational code of ethics?
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?
Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?
A risk practitioner has been asked to advise management on developing a log collection and correlation strategy. Which of the following should be the MOST important consideration when developing this strategy?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
Isaca Free Exams |
---|
![]() |