Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

IT-Risk-Fundamentals Exam Dumps - IT Risk Fundamentals Certificate Exam

Go to page:
Question # 17

An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?

A.

Risk register

B.

Risk heat map

C.

Risk report

Full Access
Question # 18

Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?

A.

The deficiencies have no business relevance.

B.

The deficiencies are actual misconfigurations.

C.

The deficiencies have already been resolved.

Full Access
Question # 19

Which of the following is MOST likely to expose an organization to adverse threats?

A.

Complex enterprise architecture

B.

Improperly configured network devices

C.

Incomplete cybersecurity training records

Full Access
Question # 20

Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?

A.

Whether the controls are functioning properly to reduce risk to acceptable levels

B.

Whether metrics to monitor control performance align with risk management standards

C.

Whether external audits confirm the same control deficiencies as reported by internal audit

Full Access
Question # 21

Which of the following is the MAIN objective of governance?

A.

Creating controls throughout the entire organization

B.

Creating risk awareness at all levels of the organization

C.

Creating value through investments for the organization

Full Access
Question # 22

Risk monitoring is MOST effective when it is conducted:

A.

following changes to the business's environment.

B.

before and after completing the risk treatment plan.

C.

throughout the risk treatment planning process.

Full Access
Question # 23

Which of the following is the PRIMARY concern with vulnerability assessments?

A.

Threat mitigation

B.

Report size

C.

False positives

Full Access
Question # 24

Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?

A.

Vulnerability assessment

B.

Threat assessment

C.

Control self-assessment

Full Access
Go to page: