Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 5
List of questions
Related questions
When analyzing l&T-related risk, an enterprise defines likelihood and impact on a scale from 1 to 5, and the scale of impact also defines a range expressed in monetary terms. Which of the following risk analysis approaches has been adopted?
Qualitative approach
Quantitative approach
Hybrid approach
Risk maps can help to develop common profiles in order to identify which of the following?
Risk that has clearly identified and assigned ownership
Risk remediation activities that have sufficient budget
Risk response activities that can be made more efficient
Which of the following is MOST important for the determination of I&T-related risk?
The impact on the business services that the IT system supports
The likelihood of occurrence for most relevant risk scenarios
The impact on competitors in the same industry
What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?
Simplicity in translating risk reports into other languages
Clarity on the proper interpretation of reported risk
Ease of promoting risk awareness with key stakeholders
An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?
Risk register
Risk heat map
Risk report
Which of the following is the MAIN reason to include previously overlooked risk in a risk report?
Assurance is needed that the risk dashboard is complete and comprehensive.
Overlooked or ignored risk may become relevant in the future.
The risk report must contain the current state of all risk.
An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?
Preventive
Corrective
Detective
Which of the following is the BEST control to prevent unauthorized user access in a remote work environment?
Read-only user privileges
Multi-factor authentication
Monthly user access recertification
Which of the following is an example of a preventive control?
File integrity monitoring (FIM) on personal database stores
Air conditioning systems with excess capacity to permit failure of certain components
Data management checks on sensitive data processing procedures
The PRIMARY reason for the implementation of additional security controls is to:
avoid the risk of regulatory noncompliance.
adhere to local data protection laws.
manage risk to acceptable tolerance levels.
Question