Of the following, who should be responsible for determining the inherent risk rating of an application?
An organization practices the principle of least privilege. To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:
Which of the following is a KEY outcome of risk ownership?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:
When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?
Risk acceptance of an exception to a security control would MOST likely be justified when:
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
Which type of indicators should be developed to measure the effectiveness of an organization's firewall rule set?
WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?
Which of the following is MOST important when developing key performance indicators (KPIs)?
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
The PRIMARY reason for communicating risk assessment results to data owners is to enable the:
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''
Which of the following is MOST important for senior management to review during an acquisition?
Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?
An organization becomes aware that IT security failed to detect a coordinated
cyber attack on its data center. Which of the following is the BEST course of
action?
Which of the following should be an element of the risk appetite of an organization?
Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:
Accountability for a particular risk is BEST represented in a:
Which of the following provides the MOST helpful information in identifying risk in an organization?
A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Which of the following is a PRIMARY reason for considering existing controls during initial risk assessment?
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
Which of the following situations reflects residual risk?
Which of the following observations from a third-party service provider review would be of GREATEST concern to a risk practitioner?
An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do
FIRST?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:
Which of the following should be the HIGHEST priority when developing a risk response?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
Which of the following will BEST help to improve an organization's risk culture?
An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization's customer service operations overseas. Which of the following would MOST significantly impact management's decision?
Which of the following is the BEST way to identify changes in the risk profile of an organization?
A global company s business continuity plan (BCP) requires the transfer of its customer information….
event of a disaster. Which of the following should be the MOST important risk consideration?
Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?
Which of the following is MOST important to sustainable development of secure IT services?
A risk manager has determined there is excessive risk with a particular technology. Who is the BEST person to own the unmitigated risk of the technology?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
Which of the following is the MOST appropriate key control indicator (KCI) to help an organization prevent successful cyber risk events on the external-facing infrastructure?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
Which of the following provides the BEST measurement of an organization's risk management maturity level?
Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
Isaca Free Exams |
---|
![]() |