Which of the following essential elements of IT Portfolio Investment Management seamlessly initiates the proje
Which of the following essential elements of IT Portfolio Investment Management seamlessly
initiates the projects, and incorporates the asset and software development costs to improve the
accuracy of ongoing portfolio assessment and project prioritization?
Which of the following outsourcing defines the performance objectives reached by negotiation between the user
Which of the following outsourcing defines the performance objectives reached by negotiation
between the user and the provider of a service, or between an outsourcer and an organization?
When residual risk is minimized:
When residual risk is minimized:
Now in which category you would put the risk concerning the modification of the Website by unauthorized parti
Suppose you are working in Techmart Inc. which sells various products through its website. Due to
some recent losses, you are trying to identify the most important risks to the Website. Based on
feedback from several experts, you have come up with a list. You now want to prioritize these
risks. Now in which category you would put the risk concerning the modification of the Website by
unauthorized parties.
Which of the following provide(s) near-immediate recoverability for time-sensitive systems and transaction pro
Which of the following provide(s) near-immediate recoverability for time-sensitive systems and
transaction processing?
Which of the following sub-processes of Capacity Management is concerned with the management of the individual
Which of the following sub-processes of Capacity Management is concerned with the
management of the individual components of the IT Infrastructure?
Quantitative risk analysis is MOST appropriate when assessment data:
Quantitative risk analysis is MOST appropriate when assessment data:
Which of the following is true for risk evaluation?
Which of the following is true for risk evaluation?
What is an effective control for granting temporary access to vendors and external support personnel?
What is an effective control for granting temporary access to vendors and external support
personnel? Choose the BEST answer.
Which of the following risk response planning techniques will you use to shift the impact of a threat to a thi
You work as the project manager for Bluewell Inc. You are working on NGQQ Project for your
company. You have completed the risk analysis processes for the risk events.
You and the project team have created risk responses for most of the identified project risks.
Which of the following risk response planning techniques will you use to shift the impact of a threat
to a third party, together with the responses?