Weekend Biggest Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

Isaca IT-Risk-Fundamentals Dumps

IT Risk Fundamentals Certificate Exam Questions and Answers

Question 1

A business impact analysis (BIA) generates the MOST benefit when:

Options:

A.

keeping impact criteria and cost data as generic as possible.

B.

measuring existing impact criteria exclusively in financial terms.

C.

using standardized frequency and impact metrics.

Question 2

Risk analysis makes it easier to communicate impact in terms of:

Options:

A.

criticality of I&T assets.

B.

lost productivity.

C.

reputational damage.

Question 3

When evaluating the current state of controls, which of the following will provide the MOST comprehensive analysis of enterprise processes, incidents, logs, and the threat environment?

Options:

A.

Enterprise architecture (EA) assessment

B.

IT operations and management evaluation

C.

Third-party assurance review

Question 4

Risk maps can help to develop common profiles in order to identify which of the following?

Options:

A.

Risk that has clearly identified and assigned ownership

B.

Risk remediation activities that have sufficient budget

C.

Risk response activities that can be made more efficient

Question 5

Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?

Options:

A.

The deficiencies have no business relevance.

B.

The deficiencies are actual misconfigurations.

C.

The deficiencies have already been resolved.

Question 6

Potential losses resulting from employee errors and system failures are examples of:

Options:

A.

operational risk.

B.

market risk.

C.

strategic risk.

Question 7

What is the PRIMARY purpose of providing timely and accurate risk information to key stakeholders?

Options:

A.

To establish risk appetite

B.

To facilitate risk-based decision making

C.

To develop effective key risk indicators (KRIs)

Question 8

When defining the risk monitoring process, management should also define the:

Options:

A.

penalties for noncompliance.

B.

continuous improvement plan.

C.

exception procedures.

Question 9

When selecting a key risk indicator (KRI), it is MOST important that the KRI:

Options:

A.

supports established KPIs.

B.

produces multiple and varied results.

C.

is a reliable predictor of the risk event.

Question 10

Risk impact criteria are PRIMARILY used to:

Options:

A.

help establish the enterprise risk appetite.

B.

determine loss associated with specific IT assets.

C.

prioritize the enterprise's risk responses.

Question 11

Which of the following is an example of an inductive method to gather information?

Options:

A.

Vulnerability analysis

B.

Controls gap analysis

C.

Penetration testing

Question 12

Which of the following is combined with risk impact to determine the level of risk?

Options:

A.

Threat level

B.

Likelihood

C.

Vulnerability score

Question 13

An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?

Options:

A.

Risk mitigation

B.

Risk transfer

C.

Risk avoidance

Question 14

Which of the following are KEY considerations when selecting the best risk response for a given situation?

Options:

A.

Alignment with risk policy and industry standards

B.

Previous risk response strategies and action plans

C.

Cost of the response and capability to implement

Question 15

Which of the following would be considered a cyber-risk?

Options:

A.

A system that does not meet the needs of users

B.

A change in security technology

C.

Unauthorized use of information

Question 16

When determining the criticality of I&T assets, it is MOST important to identify:

Options:

A.

the asset owners who are accountable for asset valuation.

B.

the business processes in which the asset is used to achieve objectives.

C.

the infrastructure in which the asset is processed and stored.

Question 17

To establish an enterprise risk appetite, an organization should:

Options:

A.

normalize risk taxonomy across the organization.

B.

aggregate risk statements for all lines of business.

C.

establish risk tolerance for each business unit.

Question 18

A bottom-up approach to developing I&T risk-related risk scenarios:

Options:

A.

is a generic method that allows anyone in the organization to develop risk scenarios.

B.

is based on hypothetical situations envisioned by people performing specific I&T functions.

C.

should not be used in conjunction with other approaches to evaluate I&T related events.

Question 19

An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?

Options:

A.

Limit travel with laptops.

B.

Accept the inherent risk.

C.

Encrypt the sales team laptops.

Question 20

An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?

Options:

A.

Risk register

B.

Risk heat map

C.

Risk report

Question 21

Which of the following is the PRIMARY reason for an organization to monitor and review l&T-related risk periodically?

Options:

A.

To address changes in external and internal risk factors

B.

To ensure risk is managed within acceptable limits

C.

To facilitate the timely identification and replacement of legacy IT assets

Question 22

Which of the following represents a vulnerability associated with legacy systems using older technology?

Options:

A.

Lost opportunity to capitalize on emerging technologies

B.

Rising costs associated with system maintenance

C.

Inability to patch or apply system updates

Question 23

Which of the following is MOST important to ensure when developing key risk indicators (KRIs)?

Options:

A.

The KRIs can be added to the risk dashboard report.

B.

KRIs can be applied to multiple risk events.

C.

Each KRI is linked to a specific risk event.

Question 24

In the context of enterprise risk management (ERM), what is the overall role of l&T risk management stakeholders?

Options:

A.

Stakeholders set direction and provide support for risk management practices.

B.

Stakeholders are accountable for all risk management activities within an enterprise.

C.

Stakeholders are responsible for protecting enterprise assets to achieve business objectives.

Question 25

Applying statistical analysis methods to I&T risk scenarios is MOST appropriate when:

Options:

A.

quantifiable historical data is available for detailed reviews.

B.

risk management professionals are unfamiliar with qualitative methods.

C.

members of senior management have advanced mathematical knowledge.

Question 26

As part of the control monitoring process, frequent control exceptions are MOST likely to indicate:

Options:

A.

excessive costs associated with use of a control.

B.

misalignment with business priorities.

C.

high risk appetite throughout the enterprise.

Question 27

If the residual risk associated with a particular control is within the enterprise risk appetite, the residual risk should be:

Options:

A.

accepted and updated in the risk register.

B.

mitigated through additional controls.

C.

transferred and managed by a third party.

Question 28

An alert generated when network bandwidth usage exceeds a predefined level is an example of a:

Options:

A.

threat.

B.

risk event.

C.

lag indicator.

D.

key risk indicator (KRI).

Question 29

Of the following, who is BEST suited to be responsible for continuous monitoring of risk?

Options:

A.

Chief risk officer (CRO)

B.

Risk analysts

C.

Risk owners

Question 30

As part of an I&T related risk assessment, which of the following should be reviewed to obtain an initial view of overall I&T related risk for the enterprise?

Options:

A.

Threats and vulnerabilities for each risk factor identified

B.

Components of the risk register with remediation plans

C.

Components of the risk universe at a high level

Question 31

Which of the following risk analysis methods gathers different types of potential risk ideas to be validated and ranked by an individual or small groups during interviews?

Options:

A.

Brainstorming model

B.

Delphi technique

C.

Monte Cado analysis

Question 32

Which types of controls are designed to avoid undesirable events, errors, and other adverse occurrences?

Options:

A.

Corrective controls

B.

Detective controls

C.

Preventive controls

Question 33

The use of risk scenarios to guide senior management through a rapidly changing market environment is considered a key risk management

Options:

A.

benefit.

B.

incentive.

C.

capability.

Question 34

Which of the following is the objective of a frequency analysis?

Options:

A.

To determine how often risk mitigation strategies should be evaluated and updated within a specific timeframe

B.

To determine how many risk scenarios will impact business objectives over a given period of time

C.

To determine how often a particular risk scenario might be expected to occur during a specified period of time

Question 35

An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?

Options:

A.

Accept

B.

Mitigate

C.

Transfer

Page: 1 / 12
Total 118 questions