Curious about Actual CIMA Professional Qualification (CIMAPRA19-P03-1) Exam Questions?
Here are sample CIMA P3 Risk Management (Online) (CIMAPRA19-P03-1) Exam questions from real exam. You can get more CIMA Professional Qualification (CIMAPRA19-P03-1) Exam premium practice questions at TestInsights.
Which TWO of the following are NOT methods used for risk identification?
Correct : B, E
Start a Discussions
KLO is a major quoted car rental company The company is considering publishing its first cyber risk management report
AH rental bookings are made online Customers receive a booking reference number that they use to collect their cars from a convenient branch Customers enter their credit card details both so that KLO can take payment for their rental and also so that the customers can be charged automatically for late returns or damage to cars
KLO's management believes that it has three key areas of cyber risk Cyber criminals may wish to make bookings using fictitious data in order to steal KLO's cars, they may wish to use customers details to identify addresses of people who are away from home so that they can burgle houses and they may wish to abuse customer credit card details
KLO's Board is concerned that admitting to the nsk of stealing cars might encourage cnminals to exploit that vulnerability AJso. it is concerned that customers will be reluctant to rent cars if that would mean that their homes could be at risk of burglary while they are away The vulnerability of credit card details seems obvious and so the Board is not reluctant to admit to that.
Which TWO of the following are correct?
Correct : A, C
Start a Discussions
TLY sell building materials such as bricks sacks of concrete and paving slabs to builders Materials are kept in a large yard Customer orders are fulfilled by a team of 30 employees who use forklift trucks to move sold items to the loading bay, from where they are loaded onto lornes for dispatch to the customer The sales office prepares dispatch notes, which are used by the yard employees to identify the items that have been ordered
Which TWO of the following controls would be cost-effective ways to prevent the theft of inventory by TLY's staff?
Correct : A, C
Start a Discussions
ZZ is a data security company that is responsible for cyber security m a large shopping mall 21 uses Network Configuration Management (NCM) to assist it in meeting the various needs of the mall's user community.
Which THREE of the following are advantages provided by NCM?
Correct : B, C, D
Start a Discussions
T has its computer facilities in a building adjacent to its headquarters Severe structural problems have been discovered with this building and T has been advised that the only option is demolition and rebuild This leaves T with strategic decisions to make about its IT provision and it has decided to investigate the outsourcing of its services
Which TWO of the following factors should T consider as most important at this stage?
Correct : D, E
Start a Discussions
Total 275 questions