Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 6
List of questions
Question 51
To address concerns of increased online skimming attacks, an enterprise is training the software development team on secure software development practices. This is an example of which of the following risk response strategies?
Question 52
An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?
Question 53
What is the FIRST step in the risk response process?
Question 54
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Question 55
Which of the following risk response strategies involves the implementation of new controls?
Question 56
Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?
Question 57
A business continuity plan (BCP) is:
Question 58
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
Question 59
Which of the following is the MOST important information for determining the critical path of a project?
Question 60
Which of the following occurs earliest in the risk response process?
Question