1.
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
2.
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
3.
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
4.
During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:
5.
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
6.
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?
7.
Which of the following should be of MOST concern to a risk practitioner reviewing findings from a recent audit of an organization's data center?
8.
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
9.
An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?
10.
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?