Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 6
List of questions
Related questions
To address concerns of increased online skimming attacks, an enterprise is training the software development team on secure software development practices. This is an example of which of the following risk response strategies?
Risk acceptance
Risk avoidance
Risk mitigation
An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?
Limit travel with laptops.
Accept the inherent risk.
Encrypt the sales team laptops.
What is the FIRST step in the risk response process?
Prioritize responses based on impact.
Review risk analysis.
Review risk appetite.
An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?
Risk mitigation
Risk transfer
Risk avoidance
Which of the following risk response strategies involves the implementation of new controls?
Mitigation
Avoidance
Acceptance
Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?
Material updates to the incident response plan
Data backups being moved to the cloud
Changes to the business impact assessment (BIA)
A business continuity plan (BCP) is:
a methodical plan detailing the steps of incident response activities.
a document of controls that reduce the risk of losing critical processes.
a risk-related document that focuses on business impact assessments (BIAs).
An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?
Accept
Mitigate
Transfer
Which of the following is the MOST important information for determining the critical path of a project?
Regulatory requirements
Cost-benefit analysis
Specified end dates
Which of the following occurs earliest in the risk response process?
Developing risk response plans
Prioritizing risk responses
Analyzing risk response options
Question