Which of the following are risk components of the COSO ERM framework?
Which of the following are risk components of the COSO ERM framework? Each correct answer represents a complete solution. Choose three.A . Risk responseB . Internal environmentC . Business continuityD . Control activitiesView AnswerAnswer: ABD Explanation: The risk components defined by the COSO ERM are internal environment, objective settings, event...
Which of the following BEST ensures that a firewall is configured in compliance with an enterprise's security policy?
Which of the following BEST ensures that a firewall is configured in compliance with an enterprise's security policy?A . Interview the firewall administrator.B . Review the actual procedures.C . Review the device's log file for recent attacks.D . Review the parameter settings.View AnswerAnswer: D Explanation: A review of the parameter...
Which of the following risks is the risk that happen with an important business partner and affects a large group of enterprises within an area or industry?
Which of the following risks is the risk that happen with an important business partner and affects a large group of enterprises within an area or industry?A . Contagious riskB . Reporting riskC . Operational riskD . Systemic riskView AnswerAnswer: D Explanation: Systemic risks are those risks that happen with...
You are the project manager of RFT project. You have identified a risk that the enterprise's IT system and application landscape is so complex that, within a few years, extending capacity will become difficult and maintaining software will become very expensive. To overcome this risk, the response adopted is re-architecture of the existing system and purchase of new integrated system. In which of the following risk prioritization options would this case be categorized?
You are the project manager of RFT project. You have identified a risk that the enterprise's IT system and application landscape is so complex that, within a few years, extending capacity will become difficult and maintaining software will become very expensive. To overcome this risk, the response adopted is re-architecture...
What should Jenny do with these risk events?
Jenny is the project manager for the NBT projects. She is working with the project team and several subject matter experts to perform the quantitative risk analysis process. During this process she and the project team uncover several risks events that were not previously identified. What should Jenny do with...
What system can help you introduce and execute the stakeholder change request with the vendor?
You are working with a vendor on your project. A stakeholder has requested a change for the project, which will add value to the project deliverables. The vendor that you're working with on the project will be affected by the change. What system can help you introduce and execute the...
Which type of risk response is this?
A part of a project deals with the hardware work. As a project manager, you have decided to hire a company to deal with all hardware work on the project. Which type of risk response is this?A . TransferenceB . MitigationC . AvoidanceD . ExploitView AnswerAnswer: A Explanation: When you...
The team has the option to use all of the following tools and techniques to diagram some of these potential risks EXCEPT for which one?
You are the project manager of GHT project. Your project team is in the process of identifying project risks on your current project. The team has the option to use all of the following tools and techniques to diagram some of these potential risks EXCEPT for which one?A . Process...
Which of the following answers best describes what Stephen should do with these risk events?
Stephen is the project manager of the GBB project. He has worked with two subject matter experts and his project team to complete the risk assessment technique. There are approximately 47 risks that have a low probability and a low impact on the project. Which of the following answers best...
Which among the following acts as a trigger for risk response process?
Which among the following acts as a trigger for risk response process?A . Risk level increases above risk appetiteB . Risk level increase above risk toleranceC . Risk level equates risk appetiteD . Risk level equates the risk toleranceView AnswerAnswer: B Explanation: The risk response process is triggered when a...