Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

IT-Risk-Fundamentals Questions and Answers

Question # 6

Which of the following is of GREATEST concern when aggregating risk information in management reports?

A.

Duplicating details of risk status

B.

Obfuscating the reasons behind risk

C.

Generalizing acceptable risk levels

Full Access
Question # 7

Detailed risk management reports should be targeted to a specific audience based on:

A.

need to know.

B.

industry benchmarks.

C.

seniority levels in the enterprise.

Full Access
Question # 8

Which of the following is the BEST way to minimize potential attack vectors on the enterprise network?

A.

Implement network log monitoring.

B.

Disable any unneeded ports.

C.

Provide annual cybersecurity awareness training.

Full Access
Question # 9

An alert generated when network bandwidth usage exceeds a predefined level is an example of a:

A.

threat.

B.

risk event.

C.

lag indicator.

D.

key risk indicator (KRI).

Full Access
Question # 10

An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?

A.

Preventive

B.

Corrective

C.

Detective

Full Access
Question # 11

Incomplete or inaccurate data may result in:

A.

availability risk.

B.

relevance risk.

C.

integrity risk.

Full Access
Question # 12

A business continuity plan (BCP) is:

A.

a methodical plan detailing the steps of incident response activities.

B.

a document of controls that reduce the risk of losing critical processes.

C.

a risk-related document that focuses on business impact assessments (BIAs).

Full Access
Question # 13

Which of the following is the MAIN reason to conduct a penetration test?

A.

To validate the results of a vulnerability assessment

B.

To validate the results of a control self-assessment

C.

To validate the results of a threat assessment

Full Access
Question # 14

Which of the following is the PRIMARY outcome of a risk scoping activity?

A.

Identification of major risk factors to be benchmarked against industry competitors

B.

Identification of potential high-impact risk areas throughout the enterprise

C.

Identification of risk scenarios related to emerging technologies

Full Access
Question # 15

Which of the following is an example of an inductive method to gather information?

A.

Vulnerability analysis

B.

Controls gap analysis

C.

Penetration testing

Full Access
Question # 16

Organizations monitor control statuses to provide assurance that:

A.

compliance with established standards is achieved.

B.

risk events are being fully mitigated.

C.

return on investment (ROI) objectives are met.

Full Access
Question # 17

Which risk response option has been adopted when an enterprise outsources disaster recovery activities to leverage the skills and expertise of a third-party provider?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk transfer

Full Access
Question # 18

A key risk indicator (KRI) is PRIMARILY used for which of the following purposes?

A.

Optimizing risk management

B.

Predicting risk events

C.

Facilitating dashboard reporting

Full Access
Question # 19

The MOST important reason to monitor implemented controls is to ensure the controls:

A.

are effective and manage risk to the desired level.

B.

enable IT operations to meet agreed service levels.

C.

mitigate risk associated with regulatory noncompliance.

Full Access
Question # 20

A risk practitioner has been tasked with analyzing new risk events added to the risk register. Which of the following analysis methods would BEST enable the risk practitioner to minimize ambiguity and subjectivity?

A.

Annual loss expectancy (ALE)

B.

Delphi method

C.

Brainstorming

Full Access
Question # 21

Which of the following is a valid source or basis for selecting key risk indicators (KRIs)?

A.

Historical enterprise risk metrics

B.

Risk workshop brainstorming

C.

External threat reporting services

Full Access
Question # 22

Of the following, who is BEST suited to be responsible for continuous monitoring of risk?

A.

Chief risk officer (CRO)

B.

Risk analysts

C.

Risk owners

Full Access
Question # 23

Which of the following statements on an organization's cybersecurity profile is BEST suited for presentation to management?

A.

The probability of a cyber attack varies between unlikely and very likely.

B.

Risk management believes the likelihood of a cyber attack is not imminent.

C.

Security measures are configured to minimize the risk of a cyber attack.

Full Access
Question # 24

Which of the following is used to estimate the frequency and magnitude of a given risk scenario?

A.

Risk analysis

B.

Risk register

C.

Risk governance

Full Access
Question # 25

Which of the following is the BEST way to interpret enterprise standards?

A.

A means of implementing policy

B.

An approved code of practice

Q Documented high-level principles

Full Access
Question # 26

An enterprise has performed a risk assessment for the risk associated with the theft of sales team laptops while in transit. The results of the assessment concluded that the cost of mitigating the risk is higher than the potential loss. Which of the following is the BEST risk response strategy?

A.

Limit travel with laptops.

B.

Accept the inherent risk.

C.

Encrypt the sales team laptops.

Full Access
Question # 27

Which of the following MUST be consistent with the defined criteria when establishing the risk management context as it relates to calculation of risk?

A.

Risk appetite and tolerance levels

B.

Formulas and methods for combining impact and likelihood

C.

Key risk indicators (KRIs) and key performance indicators (KPIs)

Full Access
Question # 28

Which of the following is important to ensure when validating the results of a frequency analysis?

A.

Estimates used during the analysis were based on reliable and historical data.

B.

The analysis was conducted by an independent third party.

C.

The analysis method has been fully documented and explained.

Full Access
Question # 29

Which of the following are KEY considerations when selecting the best risk response for a given situation?

A.

Alignment with risk policy and industry standards

B.

Previous risk response strategies and action plans

C.

Cost of the response and capability to implement

Full Access
Question # 30

The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:

A.

measurable metrics for acceptable risk levels.

B.

information about control compliance.

C.

an early warning of possible risk materialization.

Full Access
Question # 31

Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?

A.

The risk report should be published for transparency and enterprise risk awareness.

B.

The risk report should be uniform for all stakeholders to ensure consistency.

C.

The risk report should be customized to stakeholder expectations.

Full Access
Question # 32

An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?

A.

Risk mitigation

B.

Risk transfer

C.

Risk avoidance

Full Access
Question # 33

Which of the following is the MAIN reason to include previously overlooked risk in a risk report?

A.

Assurance is needed that the risk dashboard is complete and comprehensive.

B.

Overlooked or ignored risk may become relevant in the future.

C.

The risk report must contain the current state of all risk.

Full Access
Question # 34

Which of the following is the MOST important aspect of key performance indicators (KPIs)?

A.

KPIs identify underperforming assets that may impact the achievement of operational goals.

B.

KPIs provide inputs for monitoring the usage of IT assets to determine return on investment (ROI).

C.

KPIs aid management in monitoring the organization's IT infrastructure capacity.

Full Access
Question # 35

How does an enterprise decide how much risk it is willing to take to meet its business objectives?

A.

By conducting research on industry standards for acceptable risk based on similar businesses

B.

By identifying the risk conditions of the business and the impact of the loss if these risks materialize

C.

By surveying business initiatives to determine what risks would cease their operations

Full Access