100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Risk Management Fundamentals Exam Questions and Answers

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
16-10-2025
Written in
2025/2026

Risk Management Fundamentals Exam Questions and Answers Risk - answer- likelihood of a loss occurring. = Threat x Vulnerability Threat - answer- any activity that represents possible danger vulnerability - answer- a weakness; procedural, technical, or administrative Loss - answer- results in a compromise to business functions or assets. Occurs when a threat exposes a vulnerability What are risk related concerns for businesses? - answer- Compromise of business functions, assets, driver of business costs, and profitability vs survivability Business function - answer- activities or the work that a business unit or role performs to sell products/services. Business Assets - answer- is anything with a measurable value to a company. Tangible or intangible. A company sells product via a website. Revenue is $5000 per hour. If the website fails for 2 hours what is the tangible and intangible loss assuming that the repair cost is $1000. What is the tangible and intangible value? - answer- Tangiblevalue=$5,000*2+$1,000=$11,000 • IntangibleValue: - Future lost revenue - Cost of gaining a customer - Customer influence Tangible value - answer- the actual cost of the asset. Tangiblevalue=lostrevenue+Repaircost Intangible value - answer- value that can't be measured by cost for future loss of revenue, cost of gaining a customer, and customer influence. Driver of business cost - answer- Risk can drive business costs due to costs associated with managing risk by implementing controls/countermeasures. Profitability vs. survivability - answer- Profitability - ability of a company to make a profit --. Revenue - costs. Survivability - ability of company to survive a loss due to risk. Loss may cause company to lose profit. Lost opportunity costs - answer- Money spent to reduce risks can't be spent elsewhere. What must risk managers take into account when considering profitability vs survivability? - answer- Out of pocket costs to reduce risks, lost opportunity costs due to the money spent to reduce risk that can't be spent elsewhere, future costs associated with ongoing/future countermeasures What are the 7 domains of a Typical IT infrastructure? - answer- 1. User - all people, Includes usernames, passwords, biometric or other authentication, and social engineering. 2. Workstation - end user's computer/system/cell phone. 3. LAN - inside firewall, Includes equipment required to create an internal LAN, such as hubs, switches, and media 4. LAN - WAN - trusted/untrusted area needs high security, the transition area between the LAN and the WAN, including the router and firewall 5. WAN - Internet. Includes routers and circuits connecting the wide area network. 6. System/Application - serversIncludes applications you run on your network, such as e-mail, database and Web applications. 7. Remote Access - access LAN, How remote or traveling users use your network, as in a Virtual Private Network (VPN). What are characteristics of threats? - answer- Threats can't be eliminated but they may be controlled. § Threats have independent probabilities of occurring that often are unaffected by an organizational action. § Threats are attempts to exploit vulnerabilities that result in the loss of confidentiality, integrity, or availability of a business asset. Risk management - answer- the practice of identifying, assessing, controlling, and mitigating risks. Threats and vulnerabilities are key drivers of risk. What are the risk management elements/processes? - answer- 1. Assess Risk 2. Identify risks to manage 3. Select controls, 4. evaluate controls 5. Implement and test controls Reasonableness - answer- a test that can be applied to risk management to determine if the risk should be managed. Cost to manage risk vs. the impact How does the perception of risk differ by role? - answer- Management - costs of risk, profitability vs. suvivability System admin - protection systems, lock systems down Tier 1 admin - system availability Developer - including security as the design stage vs patching at the end of development End user - usability What is the risk identification process? - answer- 1. identify threats 2. Identify vulnerabilities 3. Estimate likelihood of a threat exploiting a vulnerability

Show more Read less
Institution
Risk Management Fundamentals
Course
Risk Management Fundamentals








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Risk Management Fundamentals
Course
Risk Management Fundamentals

Document information

Uploaded on
October 16, 2025
Number of pages
3
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

RISK MANAGEMENT CONCEPTS
EXAM QUESTIONS AND ANSWERS
The process of determining potential risks that could affect an organization's ability to
achieve its objectives is called: - answer- Risk identification

The process of evaluating discovered risks to understand their potential impact and
likelihood is referred to as: - answer- Risk assessment

Which of the following answers refers to a risk assessment method based on need,
typically conducted in response to specific events or changes, such as after a major
organizational change or a security breach? - answer- Ad hoc

Which of the answers listed below refers to an example of recurring risk
assessment? - answer- Quarterly or annual risk assessments

Which of the following answers refers to a risk assessment conducted for a specific
purpose or project, without plans for regular reassessment (e.g., risk assessment for
a new product launch)? - answer- One-time

Which of the answers listed below refers to an example of continuous risk
assessment? - answer- Real-time monitoring of network security threats

Assessment of risk probability and its impact based on subjective judgment falls into
the category of: - answer- Qualitative risk assessment

A calculation of SLE(Single Loss Expectancy) is an example of: - answer-
Quantitative risk assessment

Which of the following terms is used to describe the predicted loss of value to an
asset based on a single security incident? - answer- SLE(Single Loss Expectancy)

Which of the acronyms listed below refers to a risk assessment formula defining
probable financial loss due to a risk over a one-year period? - answer- ALE(Annual
Loss Expectancy)

Which of the following answers refers to the correct formula for calculating probable
financial loss due to a risk over a one-year period? - answer- ALE (Annual Loss
Expectancy) = ARO(Annual Rate of Occurrence) x SLE (Single Loss Expectancy)

In quantitative risk assessment, this term is used for estimating the likelihood of
occurrence of a future threat. - answer- ARO(Annual Rate of Occurrence)

An estimate based on the historical data of how often a threat would be successful in
exploiting a vulnerability is known as: - answer- ARO(Annual Rate of Occurrence)

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Freshy Oxford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
50
Member since
1 year
Number of followers
4
Documents
6784
Last sold
1 day ago

3.6

10 reviews

5
3
4
4
3
1
2
0
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions