ExamGecko
Home / Isaca / IT Risk Fundamentals / List of questions
Ask Question

Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 6

Add to Whishlist

List of questions

Question 51

Report Export Collapse

To address concerns of increased online skimming attacks, an enterprise is training the software development team on secure software development practices. This is an example of which of the following risk response strategies?

Become a Premium Member for full access
  Unlock Premium Member

Question 52

Report Export Collapse

An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?

Become a Premium Member for full access
  Unlock Premium Member

Question 53

Report Export Collapse

What is the FIRST step in the risk response process?

Become a Premium Member for full access
  Unlock Premium Member

Question 54

Report Export Collapse

An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?

Become a Premium Member for full access
  Unlock Premium Member

Question 55

Report Export Collapse

Which of the following risk response strategies involves the implementation of new controls?

Become a Premium Member for full access
  Unlock Premium Member

Question 56

Report Export Collapse

Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?

Become a Premium Member for full access
  Unlock Premium Member

Question 57

Report Export Collapse

A business continuity plan (BCP) is:

Become a Premium Member for full access
  Unlock Premium Member

Question 58

Report Export Collapse

An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?

Become a Premium Member for full access
  Unlock Premium Member

Question 59

Report Export Collapse

Which of the following is the MOST important information for determining the critical path of a project?

Become a Premium Member for full access
  Unlock Premium Member

Question 60

Report Export Collapse

Which of the following occurs earliest in the risk response process?

Become a Premium Member for full access
  Unlock Premium Member
Total 75 questions
Go to page: of 8