ISACA IT Risk Fundamentals IT Risk Fundamentals CertificateExam Online Training
ISACA IT Risk Fundamentals Online Training
The questions for IT Risk Fundamentals were last updated at Feb 20,2025.
- Exam Code: IT Risk Fundamentals
- Exam Name: IT Risk Fundamentals CertificateExam
- Certification Provider: ISACA
- Latest update: Feb 20,2025
Which of the following is the BEST indication of a good risk culture?
- A . The enterprise learns from negative outcomes and treats the root cause.
- B . The enterprise enables discussions of risk and facts within the risk management functions.
- C . The enterprise places a strong emphasis on the positive and negative elements of risk.
In the context of enterprise risk management (ERM), what is the overall role of l&T risk management stakeholders?
- A . Stakeholders set direction and provide support for risk management practices.
- B . Stakeholders are accountable for all risk management activities within an enterprise.
- C . Stakeholders are responsible for protecting enterprise assets to achieve business objectives.
Which of the following is the PRIMARY outcome of a risk scoping activity?
- A . Identification of major risk factors to be benchmarked against industry competitors
- B . Identification of potential high-impact risk areas throughout the enterprise
- C . Identification of risk scenarios related to emerging technologies
Publishing l&T risk-related policies and procedures BEST enables an enterprise to:
- A . set the overall expectations for risk management.
- B . hold management accountable for risk loss events.
- C . ensure regulatory compliance and adherence to risk standards.
An enterprise’s risk policy should be aligned with its:
- A . current risk.
- B . risk capacity.
- C . risk appetite.
What is the basis for determining the sensitivity of an IT asset?
- A . Potential damage to the business due to unauthorized disclosure
- B . Cost to replace the asset if lost, damaged, or deemed obsolete
- C . Importance of the asset to the business
Which of the following represents a vulnerability associated with legacy systems using older technology?
- A . Lost opportunity to capitalize on emerging technologies
- B . Rising costs associated with system maintenance
- C . Inability to patch or apply system updates
Which of the following is the GREATEST benefit of effective asset valuation?
- A . It protects the enterprise from paying more for protection than the net worth of the asset.
- B . It assures that asset valuation is consistently applied to all assets across the enterprise.
- C . It ensures assets are linked to processes and classified based on business value.
Which type of assessment evaluates the changes in technical or operating environments that could result in adverse consequences to an enterprise?
- A . Vulnerability assessment
- B . Threat assessment
- C . Control self-assessment
One of the PRIMARY purposes of threat intelligence is to understand:
- A . zero-day threats.
- B . breach likelihood.
- C . asset vulnerabilities.