Which of the following presents the GREATEST risk for the continued existence of an enterprise?
A risk practitioner has been asked to prepare a risk report by the end of the day that includes an analysis of the most significant risk events facing the organization. Which of the following would BEST enable the risk practitioner to meet the report deadline?
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Which of the following is the MAIN reason to include previously overlooked risk in a risk report?
An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?
Which of the following is the PRIMARY reason to conduct a cost-benefit analysis as part of a risk response business case?
Which of the following represents a vulnerability associated with legacy systems using older technology?
Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?
Which risk response option has been adopted when an enterprise outsources disaster recovery activities to leverage the skills and expertise of a third-party provider?
Which of the following is the MOST important aspect of key performance indicators (KPIs)?
As part of an I&T related risk assessment, which of the following should be reviewed to obtain an initial view of overall I&T related risk for the enterprise?
Which of the following is the MOST likely reason to perform a qualitative risk analysis?
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
Which of the following MUST be consistent with the defined criteria when establishing the risk management context as it relates to calculation of risk?
Which of the following includes potential risk events and the associated impact?
When determining the criticality of I&T assets, it is MOST important to identify:
Which of the following is MOST likely to expose an organization to adverse threats?
Which of the following is MOST important to ensure when developing key risk indicators (KRIs)?
Which of the following MUST be established in order to manage l&T-related risk throughout the enterprise?
If the residual risk associated with a particular control is within the enterprise risk appetite, the residual risk should be:
Which of the following is important to ensure when validating the results of a frequency analysis?
Which types of controls are designed to avoid undesirable events, errors, and other adverse occurrences?