Search Header Logo
MAY2024 RISK MGT

MAY2024 RISK MGT

Assessment

Presentation

Social Studies

University

Practice Problem

Easy

Created by

Nur Fatima Aisya Jamil

Used 21+ times

FREE Resource

22 Slides • 66 Questions

1

media

2

Multiple Choice

The aim of risk identification is to identify possible risks that may affect, either negatively or positively, the objectives of the business and the activity under

analysis.

1

True

2

False

3

Multiple Choice

The first step is to analyse potential risks that could impact the project or organisation.

1

True

2

False

4

Multiple Choice

The first step is to analyse potential risks that could impact the project or organisation

1

True

2

False

5

Multiple Choice

Once risks have been identified, they need to be analysed to determine their likelihood and potential impact.

1

True

2

False

6

Multiple Choice

After analysing the risks, they need to be evaluated to determine which ones require further attention.

1

True

2

False

7

Multiple Choice

The final step is to communicate the risk management process and consult on its effectiveness.

1

True

2

False

8

Multiple Choice

Risk management is a collaborative process and communication is essential to its success.

1

True

2

False

9

Multiple Choice

The fourth step is to treat the identified risks by implementing mitigation measures or developing contingency plans.

1

True

2

False

10

Multiple Choice

Risk assessment evaluates the relative risk for each vulnerability

1

True

2

False

11

Multiple Choice

A company is expanding its operations to a new country with different legal and regulatory requirements. What activity should they prioritize?

1

Risk analysis

2

Risk acceptance

3

Risk assessment

4

Risk mitigation

12

Multiple Choice

A new software application is being developed, and the development team wants to ensure that security vulnerabilities are identified and addressed early in the process. What activity should they prioritize?

1

Risk analysis

2

Risk acceptance

3

Risk assessment

4

Risk mitigation

13

Multiple Choice

A new regulatory requirement has been introduced, mandating stricter data protection measures. What activity should they prioritize?

1

Risk analysis

2

Risk acceptance

3

Risk assessment

4

Risk mitigation

14

Multiple Choice

An employee accidentally clicked on a malicious link in an email, resulting in a malware infection on their computer. What activity should they prioritize?

1

Risk analysis

2

Risk acceptance

3

Risk assessment

4

Risk mitigation

15

Multiple Choice

Which of the following is not accurate regarding the process of risk management?

1

The likelihood of a threat must be determined as an element of the risk assessment.

2

The level of impact of a threat must be determined as an element of the risk assessment.

3

Risk assessment is the first process in the risk management methodology.

4

Risk assessment is the result of the risk management methodology

16

Reorder

Reorder the following steps in Risk Management Cycle in business setting

Identify Risks

Analyse risks

Evaluate Risks

Mitigate risks

1
2
3
4

17

Reorder

Reorder the following steps in Risk Management Cycle in business setting starting from step 5

Monitor and review

risks

Communicate and consult risks

Record and Report

1
2
3

18

media

19

Match

Match the following

A construction project may identify risks such as weather delay or labour shortage

A construction project may identify risks such as weather delay or labour shortage

A construction project may identify risks such as weather delay or labour shortage

Identify Risks

Analyse Risks

Evaluate Risks

20

Multiple Choice

Risk identification is the process of identify and assess ____________.

1

Threats

2

Operation

3

Organisation

4

Workforce

21

Multiple Choice

The ai of risk identification is to _______________.

1

Give mental support for staff.

2

Identify possible risks.

3

Boost staff morale.

4

Give physical support to an organisation.

22

media

23

Multiple Choice

Risks should be continuously monitored and reviewed to ensure that

____________are effective.

1

New risks

2

Mitigation measures

3

Evaluation measures

4

Identification measures

24

media

25

Match

Match the following

project team may mitigate the risk of resource constraints by cross-training team members or by hiring additional staff.

project team may regularly review the status of the project's schedule and budget to identify potential resource constraints.

project manager may communicate the status of the project's schedule and budget to stakeholders and consult with them on potential mitigation strategies.

project team may maintain records of its risk assessments and mitigation measures to demonstrate compliance with quality standards or regulatory requirements.

Mitigate Risk

Monitor and Review Risk

Communicate and Consult

Record and Report

26

media

​mitigation
strategies

27

Multiple Choice

A company is considering outsourcing its data storage to a third-party cloud provider. What risk management strategy should they consider implementing?

1

Risk acceptance

2

Risk avoidance

3

Risk mitigation

4

Risk transference

28

Multiple Choice

A company's physical office space is located in an area prone to natural disasters, such as hurricanes and earthquakes. What risk management strategy should they consider implementing?

1

Risk acceptance

2

Risk avoidance

3

Risk mitigation

4

Risk transference

29

Multiple Choice

A company has identified a significant security vulnerability in its network infrastructure. However, the cost of implementing the necessary controls to

mitigate the risk is too high. What risk management strategy should they consider implementing?

1

Risk acceptance

2

Risk avoidance

3

Risk mitigation

4

Risk transference

30

Multiple Choice

How many Risk Mitigation strategies are there?

1

1

2

2

3

5

4

6

31

Match

Match the following risk mitigation strategies

reduce amount of risk

bank establish several branches

insurance

aware and avoid actions causing risk

aware and put controls

reduce

redistribution

transfer

avoidance

acceptance

32

media

33

Reorder

Reorder the following steps in risk management process as followed by

enforcement agencies

IDENTIFY HAZARDS

ASSESS HAZARDS

DEVELOP CONTROLS AND MAKE A RISK DECISION

IMPLEMENT CONTROL

SUPERVISE AND EVALUATE

1
2
3
4
5

34

media

35

Multiple Choice

In the first step, identifying hazards, law enforcement agencies should also

consider _____________.

1

Time available for execution

2

Public holidays available

3

Interest of the members

4

Attraction levels of members

36

media

37

Multiple Choice

Probability determines ___________.

1

How bad a situation could be

2

Whether a situation is categorised as high or low risk

3

How severe a risk is

4

Likelihood that a hazard may cause a problem

38

Multiple Choice

Severity asks: _______________________________?

1

How bad could it be?

2

How beautiful it is?

3

How annoying it is?

4

How irritating could it be?

39

media

40

Multiple Choice

Which of the following steps demands ‘analysis judgement’?

1

Develop control and make risk decision.

2

Assess risk.

3

Identify risk.

4

Implement control.

41

media

42

Multiple Choice

Enforce controls and evaluate soldiers understanding of standards. This

refers to ____________.

1

Supervise and Evaluate

2

Identify risk.

3

Evaluate risk.

4

D. Implement risk control

43

media

44

media

45

media

46

Multiple Choice

Retrospective risk analysis typically involves collecting historical data to identify patterns and trends in past risk events

1

True

2

False

47

Multiple Choice

Retrospective risk analysis involves evaluating potential future risks based on current data and trends

1

True

2

False

48

Multiple Choice

Retrospective risks are those that will occur in the future.

1

True

2

False

49

Multiple Choice

Retrospective risk identification is often the most common way to identify risk and the easiest. It’s easier to believe something if it has happened before.

1

True

2

False

50

Fill in the Blank

______ risks are risks that happened already.

51

Multiple Choice

Retrospective risk identification is _______________.

1

Hardest way to identify risk.

2

Easiest way to identify risk.

3

Complicated way to identify risk.

4

Useless way to identify risk

52

media

53

media

54

Multiple Choice

Investigating the reasons for a project's budget overrun that occurred last year is an example of prospective risk analysis.

1

True

2

False

55

Multiple Choice

Prospective risk analysis is not useful for developing risk mitigation strategies.

1

True

2

False

56

Multiple Choice

Prospective risks are often harder to identify.

1

True

2

False

57

Multiple Choice

Prospective risk analysis involves evaluating potential future risks based on current data and trends

1

True

2

False

58

Fill in the Blank

Potential risks that may happen in the future. This refers to _________ risks.

59

Multiple Choice

Since prospective risks have not happened, they are __________ to identify.

1

Difficult

2

Easy

3

Complicated

4

Unchallenging

60

media

61

Multiple Choice

Which of the following is NOT a method of identifying prospective risks.

1

Brainstorming

2

Conducting interview

3

Undertaking survey

4

Monitor patterns and past history

62

media

63

Multiple Choice

Everyone talking at the same time is one of the ways brainstorming.

1

True

2

False

64

Multiple Choice

How many rules are there in brainstorming?

1

1

2

7

3

9

4

10

65

Multiple Choice

Which of the following is NOT a rule of brainstorming?

1

Stay focused on the topic.

2

Be visual.

3

Go for quantity.

4

Judge the idea of others.

66

media

67

Multiple Choice

22. What is the difference between quantitative and qualitative risk analysis?

1

Qualitative analysis uses mathematical formulas and while quantitative analysis does not.

2

Purely qualitative analysis is not possible, while purely quantitative is possible

3

Quantitative analysis provides formal cost/benefit information while qualitative analysis does not.

4

There is no difference between qualitative and quantitative analysis.

68

Multiple Choice

The techniques for risk assessment in organization will be used?

1

Assessment risks

2

Countermeasure assessment

3

Qualitive and quantitative

4

Completely avoid risk

69

media

70

Multiple Choice

What the component of typical risk assessment method?

1

Identify risks

2

Countermeasure assessment

3

Reduce risk to an acceptable level

4

Completely avoid risk

71

media

72

Multiple Choice

How many components are there in risk assessment?

1

1

2

2

3

3

4

4

73

media

74

Multiple Choice

The outcome of the asset valuation process is a figure, which can be used to determine the priority or level of protection needed for each asset.

1

True

2

False

75

Multiple Choice

Things like computer hardware, retail inventory, manufacturing facilities are called tangible assets.

1

True

2

False

76

Multiple Choice

How many types of assets are there?

1

1

2

2

3

3

4

4

77

Multiple Choice

Critical data, good repetition or proprietary training material. These are the

examples of ____________.

1

Tangible asset

2

Intangible asset

3

Touchable asset

4

Untouchable asset

78

Multiple Choice

28. Intangible assets need protection even if ________________.

1

They are broken

2

They are unattainable

3

They do not take up physical space

4

They are useless

79

Multiple Choice

Licensing agreement, service contracts and leases are ____________ assets.

1

Brand related.

2

Contract related

3

Customer related

4

Building related

80

Multiple Choice

Cash, land and machines are the examples of ____________ assets.

1

Brand related.

2

Contract related

3

Customer related

4

Building related

81

Multiple Choice

Assigning a risk rating score to each asset. This refers to __________.

1

Threat assessment

2

Vulnerability assessment

3

Counter measure assessment

4

Threat identification

82

media

83

Multiple Choice

How can customer data manipulation be counter measured?

1

Dynamic credentials

2

Digital Signature

3

Encryption

4

Web application scanners

84

Multiple Choice

Dynamic credentials are the perfect counter measure for ___________ risk.

1

Data leakage

2

Customer data leakage

3

Malicious VM

4

Account / Service hijacking

85

Multiple Choice

Realistic threats need _____________; unimportant threats are _____________.

1

Investigation; set aside

2

Representation; ignored

3

Ignored; set aside

4

Investigation; prioritised

86

Multiple Choice

A company is developing a mobile application that will handle sensitive user data. What security control should be implemented to ensure secure data storage on the users' devices?

1

Encryption

2

Access control mechanisms

3

Incident response plan

4

Security awareness training

87

Multiple Choice

A company is evaluating two different security control options to protect their network: a firewall and an intrusion detection system. Which type of control should they prioritize if they want to identify and respond to potential security breaches in real-time?

1

Firewall

2

Intrusion detection system

3

Both should be implemented

4

Neither option is effective for real-time detection

88

Multiple Choice

Unimportant threats need investigation; realistic threats are set aside.

1

True

2

False

media

Show answer

Auto Play

Slide 1 / 88

SLIDE