The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:
An l&T-related risk assessment enables individuals responsible for risk governance to:
Which risk response option has been adopted when an enterprise outsources disaster recovery activities to leverage the skills and expertise of a third-party provider?
An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?
What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?
A key risk indicator (KRI) is PRIMARILY used for which of the following purposes?
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
What is the PRIMARY purpose of providing timely and accurate risk information to key stakeholders?
Which of the following represents a vulnerability associated with legacy systems using older technology?
Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?
The PRIMARY reason for the implementation of additional security controls is to:
Which of the following is an example of an inductive method to gather information?
Which of the following is important to ensure when validating the results of a frequency analysis?
Potential losses resulting from employee errors and system failures are examples of:
Which of the following BEST supports a risk-aware culture within an enterprise?
An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?
Which of the following is MOST important to include when developing a business case for a specific risk response?
Which of the following is the MAIN reason to include previously overlooked risk in a risk report?
An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?
The use of risk scenarios to guide senior management through a rapidly changing market environment is considered a key risk management
An alert generated when network bandwidth usage exceeds a predefined level is an example of a:
Of the following, which stakeholder group is MOST often responsible for risk governance?