Isaca IT Risk Fundamentals Practice Test - Questions Answers, Page 3
List of questions
Related questions
Which of the following represents a vulnerability associated with legacy systems using older technology?
Lost opportunity to capitalize on emerging technologies
Rising costs associated with system maintenance
Inability to patch or apply system updates
Which of the following is the GREATEST benefit of effective asset valuation?
It protects the enterprise from paying more for protection than the net worth of the asset.
It assures that asset valuation is consistently applied to all assets across the enterprise.
It ensures assets are linked to processes and classified based on business value.
Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?
Vulnerability assessment
Threat assessment
Control self-assessment
One of the PRIMARY purposes of threat intelligence is to understand:
zero-day threats.
breach likelihood.
asset vulnerabilities.
Which of the following is MOST likely to expose an organization to adverse threats?
Complex enterprise architecture
Improperly configured network devices
Incomplete cybersecurity training records
Which of the following is the PRIMARY concern with vulnerability assessments?
Threat mitigation
Report size
False positives
Which of the following are control conditions that exist in IT systems and may be exploited by an attacker?
Cybersecurity risk scenarios
Vulnerabilities
Threats
Which of the following is the BEST way to minimize potential attack vectors on the enterprise network?
Implement network log monitoring.
Disable any unneeded ports.
Provide annual cybersecurity awareness training.
Which of the following is an example of an inductive method to gather information?
Vulnerability analysis
Controls gap analysis
Penetration testing
Incomplete or inaccurate data may result in:
availability risk.
relevance risk.
integrity risk.
Question