
IT Risk Management Quiz
Authored by Anel Aqtasova
Information Technology (IT)
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What stages does the risk management process include? Choose the correct chain:
Risk identification - Risk assessment - Defining risk tolerance and appetite - Risk mitigation measures
Risk identification - Risk assessment - Risk prioritization - Defining risk tolerance and appetite - Risk mitigation measures
Risk identification - Risk prioritization - Risk assessment - Defining risk tolerance and appetite - Risk mitigation measures
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company performs a backup strategy where the first backup copies all data, and subsequent backups copy only the changes made since the last full backup, without relying on other intermediate backups. Which type of backup is this?
Full Backup
Incremental Backup
Differential Backup
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following situations is an example of insourced offshore IT service delivery?
An international company opens its own development center in another country for performing IT services.
The company signs a contract with a local IT firm to provide technical support.
An IT company engages a foreign contractor to perform software developments.
The company sets up a joint venture with a local firm to manage IT services in another country.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the correct chain for developing performance metrics:
Identify expected outputs – process to compare actual output with target – identify critical processes
Identify expected outputs - identify critical processes - process to compare actual output with target
Identify critical processes - process to compare actual output with target - Identify expected outputs
Identify critical processes - Identify expected outputs - process to compare actual output with target
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following processes can be described as: “This is a method for performing tests or reviews to verify that the product is free of defects and meets the user’s requirements?”
Quality assurance
Quality control
IT balance scorecard
User acceptance testing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is relevant to the results of a Business Impact Analysis (BIA)?
Estimating the cost of downtime and developing alternative data collection methods.
Identify key business processes and their recovery times.
Analyzing risks and developing strategies to minimize them.
Developing the company's information security policy.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of systems can be described as: “Functions of this system cannot be performed unless they are replaced by identical capabilities. Critical applications cannot be replaced by manual methods. Tolerance to interruption is very low; therefore, cost of interruption is very high.”
Vital
Sensitive
Critical
Non-sensitive
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?