Pass the Isaca IT Risk Fundamentals Certificate IT-Risk-Fundamentals Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is combined with risk impact to determine the level of risk?

Options:

A.

Threat level


B.

Likelihood


C.

Vulnerability score


Expert Solution
Questions # 12:

Which of the following MUST be consistent with the defined criteria when establishing the risk management context as it relates to calculation of risk?

Options:

A.

Risk appetite and tolerance levels


B.

Formulas and methods for combining impact and likelihood


C.

Key risk indicators (KRIs) and key performance indicators (KPIs)


Expert Solution
Questions # 13:

Risk analysis makes it easier to communicate impact in terms of:

Options:

A.

criticality of I&T assets.


B.

lost productivity.


C.

reputational damage.


Expert Solution
Questions # 14:

Which of the following is a KEY contributing component for determining risk rankings to direct risk response?

Options:

A.

Cost of mitigating controls


B.

Severity of a vulnerability


C.

Maturity of risk management processes


Expert Solution
Questions # 15:

Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?

Options:

A.

Whether the controls are functioning properly to reduce risk to acceptable levels


B.

Whether metrics to monitor control performance align with risk management standards


C.

Whether external audits confirm the same control deficiencies as reported by internal audit


Expert Solution
Questions # 16:

Which of the following is an example of an inductive method to gather information?

Options:

A.

Vulnerability analysis


B.

Controls gap analysis


C.

Penetration testing


Expert Solution
Questions # 17:

Which of the following would be considered a cyber-risk?

Options:

A.

A system that does not meet the needs of users


B.

A change in security technology


C.

Unauthorized use of information


Expert Solution
Questions # 18:

When selecting a key risk indicator (KRI), it is MOST important that the KRI:

Options:

A.

supports established KPIs.


B.

produces multiple and varied results.


C.

is a reliable predictor of the risk event.


Expert Solution
Questions # 19:

Risk monitoring is MOST effective when it is conducted:

Options:

A.

following changes to the business's environment.


B.

before and after completing the risk treatment plan.


C.

throughout the risk treatment planning process.


Expert Solution
Questions # 20:

Which of the following is an example of a preventive control?

Options:

A.

File integrity monitoring (FIM) on personal database stores


B.

Air conditioning systems with excess capacity to permit failure of certain components


C.

Data management checks on sensitive data processing procedures


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions