

MAY2024 RISK MGT
Presentation
•
Social Studies
•
University
•
Practice Problem
•
Easy
Nur Fatima Aisya Jamil
Used 21+ times
FREE Resource
22 Slides • 66 Questions
1
2
Multiple Choice
The aim of risk identification is to identify possible risks that may affect, either negatively or positively, the objectives of the business and the activity under
analysis.
True
False
3
Multiple Choice
The first step is to analyse potential risks that could impact the project or organisation.
True
False
4
Multiple Choice
The first step is to analyse potential risks that could impact the project or organisation
True
False
5
Multiple Choice
Once risks have been identified, they need to be analysed to determine their likelihood and potential impact.
True
False
6
Multiple Choice
After analysing the risks, they need to be evaluated to determine which ones require further attention.
True
False
7
Multiple Choice
The final step is to communicate the risk management process and consult on its effectiveness.
True
False
8
Multiple Choice
Risk management is a collaborative process and communication is essential to its success.
True
False
9
Multiple Choice
The fourth step is to treat the identified risks by implementing mitigation measures or developing contingency plans.
True
False
10
Multiple Choice
Risk assessment evaluates the relative risk for each vulnerability
True
False
11
Multiple Choice
A company is expanding its operations to a new country with different legal and regulatory requirements. What activity should they prioritize?
Risk analysis
Risk acceptance
Risk assessment
Risk mitigation
12
Multiple Choice
A new software application is being developed, and the development team wants to ensure that security vulnerabilities are identified and addressed early in the process. What activity should they prioritize?
Risk analysis
Risk acceptance
Risk assessment
Risk mitigation
13
Multiple Choice
A new regulatory requirement has been introduced, mandating stricter data protection measures. What activity should they prioritize?
Risk analysis
Risk acceptance
Risk assessment
Risk mitigation
14
Multiple Choice
An employee accidentally clicked on a malicious link in an email, resulting in a malware infection on their computer. What activity should they prioritize?
Risk analysis
Risk acceptance
Risk assessment
Risk mitigation
15
Multiple Choice
Which of the following is not accurate regarding the process of risk management?
The likelihood of a threat must be determined as an element of the risk assessment.
The level of impact of a threat must be determined as an element of the risk assessment.
Risk assessment is the first process in the risk management methodology.
Risk assessment is the result of the risk management methodology
16
Reorder
Reorder the following steps in Risk Management Cycle in business setting
Identify Risks
Analyse risks
Evaluate Risks
Mitigate risks
17
Reorder
Reorder the following steps in Risk Management Cycle in business setting starting from step 5
Monitor and review
risks
Communicate and consult risks
Record and Report
18
19
Match
Match the following
A construction project may identify risks such as weather delay or labour shortage
A construction project may identify risks such as weather delay or labour shortage
A construction project may identify risks such as weather delay or labour shortage
Identify Risks
Analyse Risks
Evaluate Risks
Identify Risks
Analyse Risks
Evaluate Risks
20
Multiple Choice
Risk identification is the process of identify and assess ____________.
Threats
Operation
Organisation
Workforce
21
Multiple Choice
The ai of risk identification is to _______________.
Give mental support for staff.
Identify possible risks.
Boost staff morale.
Give physical support to an organisation.
22
23
Multiple Choice
Risks should be continuously monitored and reviewed to ensure that
____________are effective.
New risks
Mitigation measures
Evaluation measures
Identification measures
24
25
Match
Match the following
project team may mitigate the risk of resource constraints by cross-training team members or by hiring additional staff.
project team may regularly review the status of the project's schedule and budget to identify potential resource constraints.
project manager may communicate the status of the project's schedule and budget to stakeholders and consult with them on potential mitigation strategies.
project team may maintain records of its risk assessments and mitigation measures to demonstrate compliance with quality standards or regulatory requirements.
Mitigate Risk
Monitor and Review Risk
Communicate and Consult
Record and Report
Mitigate Risk
Monitor and Review Risk
Communicate and Consult
Record and Report
26
mitigation
strategies
27
Multiple Choice
A company is considering outsourcing its data storage to a third-party cloud provider. What risk management strategy should they consider implementing?
Risk acceptance
Risk avoidance
Risk mitigation
Risk transference
28
Multiple Choice
A company's physical office space is located in an area prone to natural disasters, such as hurricanes and earthquakes. What risk management strategy should they consider implementing?
Risk acceptance
Risk avoidance
Risk mitigation
Risk transference
29
Multiple Choice
A company has identified a significant security vulnerability in its network infrastructure. However, the cost of implementing the necessary controls to
mitigate the risk is too high. What risk management strategy should they consider implementing?
Risk acceptance
Risk avoidance
Risk mitigation
Risk transference
30
Multiple Choice
How many Risk Mitigation strategies are there?
1
2
5
6
31
Match
Match the following risk mitigation strategies
reduce amount of risk
bank establish several branches
insurance
aware and avoid actions causing risk
aware and put controls
reduce
redistribution
transfer
avoidance
acceptance
reduce
redistribution
transfer
avoidance
acceptance
32
33
Reorder
Reorder the following steps in risk management process as followed by
enforcement agencies
IDENTIFY HAZARDS
ASSESS HAZARDS
DEVELOP CONTROLS AND MAKE A RISK DECISION
IMPLEMENT CONTROL
SUPERVISE AND EVALUATE
34
35
Multiple Choice
In the first step, identifying hazards, law enforcement agencies should also
consider _____________.
Time available for execution
Public holidays available
Interest of the members
Attraction levels of members
36
37
Multiple Choice
Probability determines ___________.
How bad a situation could be
Whether a situation is categorised as high or low risk
How severe a risk is
Likelihood that a hazard may cause a problem
38
Multiple Choice
Severity asks: _______________________________?
How bad could it be?
How beautiful it is?
How annoying it is?
How irritating could it be?
39
40
Multiple Choice
Which of the following steps demands ‘analysis judgement’?
Develop control and make risk decision.
Assess risk.
Identify risk.
Implement control.
41
42
Multiple Choice
Enforce controls and evaluate soldiers understanding of standards. This
refers to ____________.
Supervise and Evaluate
Identify risk.
Evaluate risk.
D. Implement risk control
43
44
45
46
Multiple Choice
Retrospective risk analysis typically involves collecting historical data to identify patterns and trends in past risk events
True
False
47
Multiple Choice
Retrospective risk analysis involves evaluating potential future risks based on current data and trends
True
False
48
Multiple Choice
Retrospective risks are those that will occur in the future.
True
False
49
Multiple Choice
Retrospective risk identification is often the most common way to identify risk and the easiest. It’s easier to believe something if it has happened before.
True
False
50
Fill in the Blank
______ risks are risks that happened already.
51
Multiple Choice
Retrospective risk identification is _______________.
Hardest way to identify risk.
Easiest way to identify risk.
Complicated way to identify risk.
Useless way to identify risk
52
53
54
Multiple Choice
Investigating the reasons for a project's budget overrun that occurred last year is an example of prospective risk analysis.
True
False
55
Multiple Choice
Prospective risk analysis is not useful for developing risk mitigation strategies.
True
False
56
Multiple Choice
Prospective risks are often harder to identify.
True
False
57
Multiple Choice
Prospective risk analysis involves evaluating potential future risks based on current data and trends
True
False
58
Fill in the Blank
Potential risks that may happen in the future. This refers to _________ risks.
59
Multiple Choice
Since prospective risks have not happened, they are __________ to identify.
Difficult
Easy
Complicated
Unchallenging
60
61
Multiple Choice
Which of the following is NOT a method of identifying prospective risks.
Brainstorming
Conducting interview
Undertaking survey
Monitor patterns and past history
62
63
Multiple Choice
Everyone talking at the same time is one of the ways brainstorming.
True
False
64
Multiple Choice
How many rules are there in brainstorming?
1
7
9
10
65
Multiple Choice
Which of the following is NOT a rule of brainstorming?
Stay focused on the topic.
Be visual.
Go for quantity.
Judge the idea of others.
66
67
Multiple Choice
22. What is the difference between quantitative and qualitative risk analysis?
Qualitative analysis uses mathematical formulas and while quantitative analysis does not.
Purely qualitative analysis is not possible, while purely quantitative is possible
Quantitative analysis provides formal cost/benefit information while qualitative analysis does not.
There is no difference between qualitative and quantitative analysis.
68
Multiple Choice
The techniques for risk assessment in organization will be used?
Assessment risks
Countermeasure assessment
Qualitive and quantitative
Completely avoid risk
69
70
Multiple Choice
What the component of typical risk assessment method?
Identify risks
Countermeasure assessment
Reduce risk to an acceptable level
Completely avoid risk
71
72
Multiple Choice
How many components are there in risk assessment?
1
2
3
4
73
74
Multiple Choice
The outcome of the asset valuation process is a figure, which can be used to determine the priority or level of protection needed for each asset.
True
False
75
Multiple Choice
Things like computer hardware, retail inventory, manufacturing facilities are called tangible assets.
True
False
76
Multiple Choice
How many types of assets are there?
1
2
3
4
77
Multiple Choice
Critical data, good repetition or proprietary training material. These are the
examples of ____________.
Tangible asset
Intangible asset
Touchable asset
Untouchable asset
78
Multiple Choice
28. Intangible assets need protection even if ________________.
They are broken
They are unattainable
They do not take up physical space
They are useless
79
Multiple Choice
Licensing agreement, service contracts and leases are ____________ assets.
Brand related.
Contract related
Customer related
Building related
80
Multiple Choice
Cash, land and machines are the examples of ____________ assets.
Brand related.
Contract related
Customer related
Building related
81
Multiple Choice
Assigning a risk rating score to each asset. This refers to __________.
Threat assessment
Vulnerability assessment
Counter measure assessment
Threat identification
82
83
Multiple Choice
How can customer data manipulation be counter measured?
Dynamic credentials
Digital Signature
Encryption
Web application scanners
84
Multiple Choice
Dynamic credentials are the perfect counter measure for ___________ risk.
Data leakage
Customer data leakage
Malicious VM
Account / Service hijacking
85
Multiple Choice
Realistic threats need _____________; unimportant threats are _____________.
Investigation; set aside
Representation; ignored
Ignored; set aside
Investigation; prioritised
86
Multiple Choice
A company is developing a mobile application that will handle sensitive user data. What security control should be implemented to ensure secure data storage on the users' devices?
Encryption
Access control mechanisms
Incident response plan
Security awareness training
87
Multiple Choice
A company is evaluating two different security control options to protect their network: a firewall and an intrusion detection system. Which type of control should they prioritize if they want to identify and respond to potential security breaches in real-time?
Firewall
Intrusion detection system
Both should be implemented
Neither option is effective for real-time detection
88
Multiple Choice
Unimportant threats need investigation; realistic threats are set aside.
True
False
Show answer
Auto Play
Slide 1 / 88
SLIDE
Similar Resources on Wayground
82 questions
Phishing Email Training
Presentation
•
University
81 questions
CCU4 PES day 2
Presentation
•
University
86 questions
LEARNING GUIDE FAMILY
Presentation
•
KG - University
80 questions
Formative_Congratulation, Hpe and Wishes.
Presentation
•
KG - University
87 questions
English I for Medicine (Review) HITO 3
Presentation
•
University
82 questions
unit 3 level 1
Presentation
•
University
83 questions
Presentazione senza titolo
Presentation
•
University
81 questions
SEPT'25 - Week 3 Lesson 3
Presentation
•
University
Popular Resources on Wayground
10 questions
5.P.1.3 Distance/Time Graphs
Quiz
•
5th Grade
10 questions
Fire Drill
Quiz
•
2nd - 5th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
15 questions
Hargrett House Quiz: Community & Service
Quiz
•
5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade