Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca IT-Risk-Fundamentals - IT Risk Fundamentals Certificate Exam

Page: 2 / 4
Total 118 questions

Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?

A.

Vulnerability assessment

B.

Threat assessment

C.

Control self-assessment

A risk practitioner has been tasked with analyzing new risk events added to the risk register. Which of the following analysis methods would BEST enable the risk practitioner to minimize ambiguity and subjectivity?

A.

Annual loss expectancy (ALE)

B.

Delphi method

C.

Brainstorming

Which of the following is a potential risk associated with IT hardware or devices?

A.

Loss of source code

B.

Lack of interoperability

C.

Sniffing attack

Which of the following is an example of a tangible and assessable representation of risk?

A.

Enterprise risk policy

B.

Risk treatment plan

C.

Risk scenario

Which of the following is the BEST indication of a good risk culture?

A.

The enterprise learns from negative outcomes and treats the root cause.

B.

The enterprise enables discussions of risk and facts within the risk management functions.

C.

The enterprise places a strong emphasis on the positive and negative elements of risk.

Which of the following risk response strategies involves the implementation of new controls?

A.

Mitigation

B.

Avoidance

C.

Acceptance

An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?

A.

5%

B.

4%

C.

8%

An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?

A.

Accept

B.

Mitigate

C.

Transfer

Potential losses resulting from employee errors and system failures are examples of:

A.

operational risk.

B.

market risk.

C.

strategic risk.

Which of the following is MOST important for the determination of I&T-related risk?

A.

The impact on the business services that the IT system supports

B.

The likelihood of occurrence for most relevant risk scenarios

C.

The impact on competitors in the same industry