Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 3

List of questions
Question 21

Which of the following represents a vulnerability associated with legacy systems using older technology?
Question 22

Which of the following is the GREATEST benefit of effective asset valuation?
Question 23

Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?
Question 24

One of the PRIMARY purposes of threat intelligence is to understand:
Question 25

Which of the following is MOST likely to expose an organization to adverse threats?
Question 26

Which of the following is the PRIMARY concern with vulnerability assessments?
Question 27

Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?
Question 28

Which of the following is the BEST way to minimize potential attack vectors on the enterprise network?
Question 29

Which of the following is an example of an inductive method to gather information?
Question 30

Incomplete or inaccurate data may result in:
Question