Which of the following is an example of a preventive control?
Which of the following is the MAIN reason to conduct a penetration test?
As part of the control monitoring process, frequent control exceptions are MOST likely to indicate:
Which types of controls are designed to avoid undesirable events, errors, and other adverse occurrences?
When determining the criticality of I&T assets, it is MOST important to identify:
Key risk indicators (KRIs) are metrics designed to:
Which of the following is the PRIMARY concern with vulnerability assessments?
As part of an I&T related risk assessment, which of the following should be reviewed to obtain an initial view of overall I&T related risk for the enterprise?
Which of the following is of GREATEST concern when aggregating risk information in management reports?
An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?
Potential losses resulting from employee errors and system failures are examples of:
Which of the following is the FIRST step in an advanced persistent threat (APT) attack?
One of the PRIMARY purposes of threat intelligence is to understand:
Of the following, which stakeholder group is MOST often responsible for risk governance?
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
Which of the following is a potential risk associated with IT hardware or devices?
When selecting a key risk indicator (KRI), it is MOST important that the KRI:
Which of the following is an example of a tangible and assessable representation of risk?
Of the following, who is BEST suited to be responsible for continuous monitoring of risk?
Which of the following is the BEST way to interpret enterprise standards?
Which of the following is the MOST likely reason to perform a qualitative risk analysis?
Which of the following is the PRIMARY reason to conduct a cost-benefit analysis as part of a risk response business case?
The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:
Which of the following is the MAIN objective of governance?
An enterprise’s risk policy should be aligned with its:
Which of the following is the BEST control to prevent unauthorized user access in a remote work environment?
Risk monitoring is MOST effective when it is conducted:
The PRIMARY goal of a business continuity plan (BCP) is to enable the enterprise to provide:
A key risk indicator (KRI) is PRIMARILY used for which of the following purposes?
Which of the following is the MAIN advantage of a risk taxonomy?
An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?
Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?
To address concerns of increased online skimming attacks, an enterprise is training the software development team on secure software development practices. This is an example of which of the following risk response strategies?
Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?
Which of the following is important to ensure when validating the results of a frequency analysis?