Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

IT-Risk-Fundamentals Exam Dumps - IT Risk Fundamentals Certificate Exam

Go to page:
Question # 4

Which of the following is the BEST control to prevent unauthorized user access in a remote work environment?

A.

Read-only user privileges

B.

Multi-factor authentication

C.

Monthly user access recertification

Full Access
Question # 5

When analyzing l&T-related risk, an enterprise defines likelihood and impact on a scale from 1 to 5, and the scale of impact also defines a range expressed in monetary terms. Which of the following risk analysis approaches has been adopted?

A.

Qualitative approach

B.

Quantitative approach

C.

Hybrid approach

Full Access
Question # 6

An enterprise recently implemented multi-factor authentication. During the most recent risk assessment, it was determined that cybersecurity risk is within the organization's risk appetite threshold. What is the MOST appropriate action for the organization to take regarding the remaining cybersecurity residual risk?

A.

Accept

B.

Mitigate

C.

Transfer

Full Access
Question # 7

Which of the following is MOST important for a risk practitioner to ensure when preparing a risk report?

A.

The risk report should be published for transparency and enterprise risk awareness.

B.

The risk report should be uniform for all stakeholders to ensure consistency.

C.

The risk report should be customized to stakeholder expectations.

Full Access
Question # 8

Which of the following is used to estimate the frequency and magnitude of a given risk scenario?

A.

Risk analysis

B.

Risk register

C.

Risk governance

Full Access
Go to page: