Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 3
List of questions
Question 21
Which of the following represents a vulnerability associated with legacy systems using older technology?
Question 22
Which of the following is the GREATEST benefit of effective asset valuation?
Question 23
Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?
Question 24
One of the PRIMARY purposes of threat intelligence is to understand:
Question 25
Which of the following is MOST likely to expose an organization to adverse threats?
Question 26
Which of the following is the PRIMARY concern with vulnerability assessments?
Question 27
Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?
Question 28
Which of the following is the BEST way to minimize potential attack vectors on the enterprise network?
Question 29
Which of the following is an example of an inductive method to gather information?
Question 30
Incomplete or inaccurate data may result in:
Question