Pass the Isaca IT Risk Fundamentals Certificate IT-Risk-Fundamentals Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?

Options:

A.

Cybersecurity risk scenarios


B.

Vulnerabilities


C.

Threats


Expert Solution
Questions # 32:

Which of the following is the MOST important factor to consider when developing effective risk scenarios?

Options:

A.

Risk events that affect both financial and strategic objectives


B.

Previously materialized risk events impacting competitors


C.

Real and relevant potential risk events


Expert Solution
Questions # 33:

Which of the following is the PRIMARY reason to conduct a cost-benefit analysis as part of a risk response business case?

Options:

A.

To determine if the reduction in risk is sufficient to justify the cost of implementing the response


B.

To determine the future resource requirements and funding needed to monitor the related risk


C.

To calculate the total return on investment (ROI) over time and benefit to enterprise risk management (ERM)


Expert Solution
Questions # 34:

Which risk response option has been adopted when an enterprise outsources disaster recovery activities to leverage the skills and expertise of a third-party provider?

Options:

A.

Risk mitigation


B.

Risk avoidance


C.

Risk transfer


Expert Solution
Questions # 35:

An alert generated when network bandwidth usage exceeds a predefined level is an example of a:

Options:

A.

threat.


B.

risk event.


C.

lag indicator.


D.

key risk indicator (KRI).


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions