Weekend Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Isaca > IT Risk Fundamentals Certificate > IT-Risk-Fundamentals

IT-Risk-Fundamentals IT Risk Fundamentals Certificate Exam Question and Answers

Question # 4

Which of the following is the MAIN advantage of a risk taxonomy?

A.

It enables risk quantification.

B.

It provides a scheme for classifying categories of risk.

C.

It promotes alignment with industry best practices for risk management.

Full Access
Question # 5

Which of the following is MOST likely to expose an organization to adverse threats?

A.

Complex enterprise architecture

B.

Improperly configured network devices

C.

Incomplete cybersecurity training records

Full Access
Question # 6

Which of the following risk response strategies involves the implementation of new controls?

A.

Mitigation

B.

Avoidance

C.

Acceptance

Full Access
Question # 7

Which of the following is the MOST important aspect of key performance indicators (KPIs)?

A.

KPIs identify underperforming assets that may impact the achievement of operational goals.

B.

KPIs provide inputs for monitoring the usage of IT assets to determine return on investment (ROI).

C.

KPIs aid management in monitoring the organization's IT infrastructure capacity.

Full Access
Question # 8

Which of the following represents a vulnerability associated with legacy systems using older technology?

A.

Lost opportunity to capitalize on emerging technologies

B.

Rising costs associated with system maintenance

C.

Inability to patch or apply system updates

Full Access
Question # 9

What is the FIRST step in the risk response process?

A.

Prioritize responses based on impact.

B.

Review risk analysis.

C.

Review risk appetite.

Full Access
Question # 10

Which of the following is MOST important for the determination of I&T-related risk?

A.

The impact on the business services that the IT system supports

B.

The likelihood of occurrence for most relevant risk scenarios

C.

The impact on competitors in the same industry

Full Access
Question # 11

Which of the following is MOST important when defining an organization's risk scope?

A.

Understanding the impacts of the risk environment to the organization

B.

Developing a top-down approach to risk management

C.

Developing requirements for risk reporting to executive management

Full Access
Question # 12

Which of the following provides the BEST input when developing specific, measurable, realistic, and time-bound (SMART) metrics?

A.

Associated business functions or services

B.

Industry best practices

C.

Enterprise risk management strategy

Full Access
Question # 13

Which of the following occurs earliest in the risk response process?

A.

Developing risk response plans

B.

Prioritizing risk responses

C.

Analyzing risk response options

Full Access
Question # 14

Which of the following should be found in an I&T asset inventory to help inform the risk identification process?

A.

Loss scenario information for assets

B.

Security classification of assets

C.

Regulatory requirements of assets

Full Access
Question # 15

Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?

A.

The risk report should be published for transparency and enterprise risk awareness.

B.

The risk report should be uniform for all stakeholders to ensure consistency.

C.

The risk report should be customized to stakeholder expectations.

Full Access
Question # 16

As part of the control monitoring process, frequent control exceptions are MOST likely to indicate:

A.

excessive costs associated with use of a control.

B.

misalignment with business priorities.

C.

high risk appetite throughout the enterprise.

Full Access
Question # 17

An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?

A.

5%

B.

4%

C.

8%

Full Access
Question # 18

Which of the following is an example of a preventive control?

A.

File integrity monitoring (FIM) on personal database stores

B.

Air conditioning systems with excess capacity to permit failure of certain components

C.

Data management checks on sensitive data processing procedures

Full Access
Question # 19

What is the PRIMARY purpose of providing timely and accurate risk information to key stakeholders?

A.

To establish risk appetite

B.

To facilitate risk-based decision making

C.

To develop effective key risk indicators (KRIs)

Full Access
Question # 20

Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?

A.

Whether the controls are functioning properly to reduce risk to acceptable levels

B.

Whether metrics to monitor control performance align with risk management standards

C.

Whether external audits confirm the same control deficiencies as reported by internal audit

Full Access
Question # 21

Which of the following MUST be established in order to manage l&T-related risk throughout the enterprise?

A.

An enterprise risk governance committee

B.

The enterprise risk universe

C.

Industry best practices for risk management

Full Access
Question # 22

Which of the following is of GREATEST concern when aggregating risk information in management reports?

A.

Duplicating details of risk status

B.

Obfuscating the reasons behind risk

C.

Generalizing acceptable risk levels

Full Access
Question # 23

What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?

A.

Simplicity in translating risk reports into other languages

B.

Clarity on the proper interpretation of reported risk

C.

Ease of promoting risk awareness with key stakeholders

Full Access
Question # 24

Which of the following is the MOST important factor to consider when developing effective risk scenarios?

A.

Risk events that affect both financial and strategic objectives

B.

Previously materialized risk events impacting competitors

C.

Real and relevant potential risk events

Full Access
Question # 25

What is the basis for determining the sensitivity of an IT asset?

A.

Potential damage to the business due to unauthorized disclosure

B.

Cost to replace the asset if lost, damaged, or deemed obsolete

C.

Importance of the asset to the business

Full Access
Question # 26

Key risk indicators (KRIs) are used for which of the following purposes when developing a project plan?

A.

Determining resource allocation

B.

Assigning risk owners

C.

Performing a gap analysis

Full Access
Question # 27

Which of the following is the MAIN objective of governance?

A.

Creating controls throughout the entire organization

B.

Creating risk awareness at all levels of the organization

C.

Creating value through investments for the organization

Full Access
Question # 28

Which of the following presents the GREATEST risk for the continued existence of an enterprise?

A.

When its risk appetite and tolerance are reviewed annually

B.

When its actual risk eventually exceeds organizational risk appetite

C.

When its risk appetite and actual risk exceed its risk capacity

Full Access
Question # 29

Which of the following is an example of an inductive method to gather information?

A.

Vulnerability analysis

B.

Controls gap analysis

C.

Penetration testing

Full Access
Question # 30

One of the PRIMARY purposes of threat intelligence is to understand:

A.

zero-day threats.

B.

breach likelihood.

C.

asset vulnerabilities.

Full Access
Question # 31

When determining the criticality of I&T assets, it is MOST important to identify:

A.

the asset owners who are accountable for asset valuation.

B.

the business processes in which the asset is used to achieve objectives.

C.

the infrastructure in which the asset is processed and stored.

Full Access
Question # 32

Which of the following is combined with risk impact to determine the level of risk?

A.

Threat level

B.

Likelihood

C.

Vulnerability score

Full Access
Question # 33

A risk practitioner has been tasked with analyzing new risk events added to the risk register. Which of the following analysis methods would BEST enable the risk practitioner to minimize ambiguity and subjectivity?

A.

Annual loss expectancy (ALE)

B.

Delphi method

C.

Brainstorming

Full Access
Question # 34

An enterprise has moved its data center from a flood-prone area where it had experienced significant service disruptions to one that is not a flood zone. Which risk response strategy has the organization selected?

A.

Risk mitigation

B.

Risk transfer

C.

Risk avoidance

Full Access
Question # 35

As part of an I&T related risk assessment, which of the following should be reviewed to obtain an initial view of overall I&T related risk for the enterprise?

A.

Threats and vulnerabilities for each risk factor identified

B.

Components of the risk register with remediation plans

C.

Components of the risk universe at a high level

Full Access