Which of the following is important to ensure when validating the results of a frequency analysis?
Potential losses resulting from employee errors and system failures are examples of:
Which of the following is the BEST control to prevent unauthorized user access in a remote work environment?
The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:
An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?
If the residual risk associated with a particular control is within the enterprise risk appetite, the residual risk should be:
Which of the following is the BEST reason for an enterprise to avoid an absolute prohibition on risk?
Which of the following is MOST important to ensure when developing key risk indicators (KRIs)?
Which of the following includes potential risk events and the associated impact?
The PRIMARY reason for the implementation of additional security controls is to:
Which of the following is the MOST important information for determining the critical path of a project?
Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?
Which of the following risk analysis methods gathers different types of potential risk ideas to be validated and ranked by an individual or small groups during interviews?
Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?
Which of the following is an example of an inductive method to gather information?
When evaluating the current state of controls, which of the following will provide the MOST comprehensive analysis of enterprise processes, incidents, logs, and the threat environment?
Which of the following provides the MOST important input for analyzing I&T-related risk?
Which of the following risk response strategies involves the implementation of new controls?
Which of the following is the MOST important factor to consider when developing effective risk scenarios?
Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?
Which of the following is the PRIMARY objective of vulnerability assessments?
Which of the following BEST supports a risk-aware culture within an enterprise?
For risk reporting to adequately reflect current risk management capabilities, the risk report should be based on the enterprise: