Isaca IT-Risk-Fundamentals - IT Risk Fundamentals Certificate Exam
Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?
A risk practitioner has been tasked with analyzing new risk events added to the risk register. Which of the following analysis methods would BEST enable the risk practitioner to minimize ambiguity and subjectivity?
Which of the following is a potential risk associated with IT hardware or devices?
Which of the following is an example of a tangible and assessable representation of risk?
Which of the following is the BEST indication of a good risk culture?
Which of the following risk response strategies involves the implementation of new controls?
An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
Potential losses resulting from employee errors and system failures are examples of:
Which of the following is MOST important for the determination of I&T-related risk?