Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca IT-Risk-Fundamentals Practice Exam with Questions & Answers | Set: 3

Questions 21

An enterprise that uses a two-factor authentication login method for accessing sensitive data has implemented which type of control?

Options:
A.

Preventive

B.

Corrective

C.

Detective

Isaca IT-Risk-Fundamentals Premium Access
Questions 22

Incomplete or inaccurate data may result in:

Options:
A.

availability risk.

B.

relevance risk.

C.

integrity risk.

Questions 23

Which of the following is a potential risk associated with IT hardware or devices?

Options:
A.

Loss of source code

B.

Lack of interoperability

C.

Sniffing attack

Questions 24

What is the PRIMARY benefit of using generic technology terms in IT risk assessment reports to management?

Options:
A.

Simplicity in translating risk reports into other languages

B.

Clarity on the proper interpretation of reported risk

C.

Ease of promoting risk awareness with key stakeholders

Questions 25

Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?

Options:
A.

Whether the controls are functioning properly to reduce risk to acceptable levels

B.

Whether metrics to monitor control performance align with risk management standards

C.

Whether external audits confirm the same control deficiencies as reported by internal audit

Questions 26

Which of the following is MOST likely to expose an organization to adverse threats?

Options:
A.

Complex enterprise architecture

B.

Improperly configured network devices

C.

Incomplete cybersecurity training records

Questions 27

Which of the following statements on an organization's cybersecurity profile is BEST suited for presentation to management?

Options:
A.

The probability of a cyber attack varies between unlikely and very likely.

B.

Risk management believes the likelihood of a cyber attack is not imminent.

C.

Security measures are configured to minimize the risk of a cyber attack.

Questions 28

To be effective, risk reporting and communication should provide:

Options:
A.

risk reports to each business unit and groups of employees.

B.

the same risk information for each decision-making stakeholder.

C.

stakeholders with concise information focused on key points.

Questions 29

A business impact analysis (BIA) generates the MOST benefit when:

Options:
A.

keeping impact criteria and cost data as generic as possible.

B.

measuring existing impact criteria exclusively in financial terms.

C.

using standardized frequency and impact metrics.

Questions 30

Which of the following would be considered a cyber-risk?

Options:
A.

A system that does not meet the needs of users

B.

A change in security technology

C.

Unauthorized use of information