Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 6

List of questions
Question 51

To address concerns of increased online skimming attacks, an enterprise is training the software development team on secure software development practices. This is an example of which of the following risk response strategies?
Question 52

An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?
Question 53

What is the FIRST step in the risk response process?
Question 54

An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Question 55

Which of the following risk response strategies involves the implementation of new controls?
Question 56

Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?
Question 57

A business continuity plan (BCP) is:
Question 58

An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
Question 59

Which of the following is the MOST important information for determining the critical path of a project?
Question 60

Which of the following occurs earliest in the risk response process?
Question