Isaca
IT Risk Fundamentals
Q1:
Which of the following is an example of a preventive control?
○
A
File integrity monitoring (FIM) on personal database stores○
B
Air conditioning systems with excess capacity to permit failure of certain components○
C
Data management checks on sensitive data processing procedures
Isaca
IT Risk Fundamentals
Q2:
Which of the following is the BEST control to prevent unauthorized user access in a remote work environment?
○
A
Read-only user privileges○
B
Multi-factor authentication○
C
Monthly user access recertification
Isaca
IT Risk Fundamentals
Q3:
An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?
○
A
Preventive○
B
Corrective○
C
Detective
Isaca
IT Risk Fundamentals
Q4:
Which of the following is the MAIN reason to include previously overlooked risk in a risk report?
○
A
Assurance is needed that the risk dashboard is complete and comprehensive.○
B
Overlooked or ignored risk may become relevant in the future.○
C
The risk report must contain the current state of all risk.
Isaca
IT Risk Fundamentals
Q5:
An enterprise has initiated a project to implement a risk-mitigating control. Which of the following would provide senior management with the MOST useful information on the project's status?
○
A
Risk register○
B
Risk heat map○
C
Risk report