Which of the following is an example of a tangible and assessable representation of risk?
An l&T-related risk assessment enables individuals responsible for risk governance to:
To address concerns of increased online skimming attacks, an enterprise is training the software development team on secure software development practices. This is an example of which of the following risk response strategies?
Which of the following is the PRIMARY objective of vulnerability assessments?
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?
For risk reporting to adequately reflect current risk management capabilities, the risk report should be based on the enterprise:
Risk maps can help to develop common profiles in order to identify which of the following?
The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:
An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?
Which of the following is MOST likely to expose an organization to adverse threats?
Which of the following is a KEY contributing component for determining risk rankings to direct risk response?
Which of the following would be considered a cyber-risk?
Publishing l&T risk-related policies and procedures BEST enables an enterprise to:
The PRIMARY reason for the implementation of additional security controls is to:
Which of the following is a benefit of using a top-down approach when developing risk scenarios?
Which of the following provides the MOST important input for analyzing I&T-related risk?
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Which of the following risk analysis methods gathers different types of potential risk ideas to be validated and ranked by an individual or small groups during interviews?
Which of the following MUST be consistent with the defined criteria when establishing the risk management context as it relates to calculation of risk?
Of the following, which stakeholder group is MOST often responsible for risk governance?
Which of the following is MOST important when defining an organization's risk scope?
Which of the following statements on an organization's cybersecurity profile is BEST suited for presentation to management?
Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?
A business continuity plan (BCP) is:
Which of the following is the PRIMARY outcome of a risk scoping activity?
Which of the following is an example of an inductive method to gather information?
The use of risk scenarios to guide senior management through a rapidly changing market environment is considered a key risk management
Which of the following is the objective of a frequency analysis?
Which of the following is MOST likely to promote ethical and open communication of risk management activities at the executive level?
Which of the following is the BEST way to minimize potential attack vectors on the enterprise network?
Which of the following is the GREATEST benefit of effective asset valuation?
Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?
Which of the following includes potential risk events and the associated impact?