IT Risk Fundamentals Certificate Exam Questions and Answers
A business impact analysis (BIA) generates the MOST benefit when:
Risk analysis makes it easier to communicate impact in terms of:
When evaluating the current state of controls, which of the following will provide the MOST comprehensive analysis of enterprise processes, incidents, logs, and the threat environment?
Risk maps can help to develop common profiles in order to identify which of the following?
Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?
Potential losses resulting from employee errors and system failures are examples of:
What is the PRIMARY purpose of providing timely and accurate risk information to key stakeholders?
When defining the risk monitoring process, management should also define the:
When selecting a key risk indicator (KRI), it is MOST important that the KRI:
Risk impact criteria are PRIMARILY used to:
Which of the following is an example of an inductive method to gather information?
Which of the following is combined with risk impact to determine the level of risk?
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Which of the following are KEY considerations when selecting the best risk response for a given situation?
Which of the following would be considered a cyber-risk?
When determining the criticality of I&T assets, it is MOST important to identify:
To establish an enterprise risk appetite, an organization should:
A bottom-up approach to developing I&T risk-related risk scenarios:
An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?
An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?
Which of the following is the PRIMARY reason for an organization to monitor and review l&T-related risk periodically?
Which of the following represents a vulnerability associated with legacy systems using older technology?
Which of the following is MOST important to ensure when developing key risk indicators (KRIs)?
In the context of enterprise risk management (ERM), what is the overall role of l&T risk management stakeholders?
Applying statistical analysis methods to I&T risk scenarios is MOST appropriate when:
As part of the control monitoring process, frequent control exceptions are MOST likely to indicate:
If the residual risk associated with a particular control is within the enterprise risk appetite, the residual risk should be:
An alert generated when network bandwidth usage exceeds a predefined level is an example of a:
Of the following, who is BEST suited to be responsible for continuous monitoring of risk?
As part of an I&T related risk assessment, which of the following should be reviewed to obtain an initial view of overall I&T related risk for the enterprise?
Which of the following risk analysis methods gathers different types of potential risk ideas to be validated and ranked by an individual or small groups during interviews?
Which types of controls are designed to avoid undesirable events, errors, and other adverse occurrences?
The use of risk scenarios to guide senior management through a rapidly changing market environment is considered a key risk management
Which of the following is the objective of a frequency analysis?
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?