ISACA • Risk-Fund
Validates foundational IT risk knowledge, covering risk governance and management, risk identification, risk assessment and analysis, risk response, and risk monitoring, reporting, and communication, including IT risk terminology and general risk management practices.
Questions
616
Duration
120 minutes
Passing Score
65%
Difficulty
FoundationalLast Updated
Feb 2026
The ISACA IT Risk Fundamentals Certificate is a foundational-level credential designed to validate comprehensive knowledge of IT risk terminology, concepts, and general risk management practices as they apply to information and technology (I&T). The certificate covers the full lifecycle of IT risk management—from governance and risk identification through assessment, analysis, response, and ongoing monitoring and communication. It is aligned with ISACA's globally recognized IT risk framework and provides a structured understanding of how organizations identify, assess, and respond to risks that could affect I&T-related assets and operations.
Introduced by ISACA in 2020, this certificate serves as an accessible entry point into the IT risk discipline, offering structured learning across six clearly defined domains. Candidates who earn the certificate demonstrate that they can apply foundational risk concepts in real-world scenarios, understand risk governance structures, and communicate risk findings effectively. It is also recognized as a stepping stone toward ISACA's more advanced Certified in Risk and Information Systems Control (CRISC) certification.
The IT Risk Fundamentals Certificate is designed for professionals who are new to IT risk management or looking to formalize and validate their foundational knowledge in the field. This includes entry-level IT risk analysts, IT auditors, compliance specialists, security professionals, and technology staff who want to develop fluency in risk terminology and practices. It is equally appropriate for non-IT professionals—such as business analysts or internal auditors—who interact with IT risk processes and need a structured understanding of the discipline.
Organizations seeking to upskill entire teams in baseline risk awareness will also find this certificate relevant, as ISACA offers group and corporate training options. There are no formal prerequisites, making it accessible to candidates at any stage of their career who have an interest in IT risk management.
There are no formal prerequisites for the IT Risk Fundamentals Certificate. ISACA allows any candidate to register and sit for the exam at any time, with no prior certifications, education requirements, or work experience mandated. This open-access model reflects the foundational nature of the credential.
While no experience is required, candidates will benefit from a general familiarity with information technology concepts and basic organizational structures. Those with exposure to IT audit, cybersecurity, compliance, or governance functions may find the material more intuitive. ISACA recommends using its official study resources—particularly the IT Risk Fundamentals Study Guide and the online course available through the ISACA Perform platform—to prepare for the exam, regardless of prior background.
The IT Risk Fundamentals exam consists of 75 questions delivered over a 120-minute testing window. Questions are a blend of multiple-choice and performance-based formats; performance-based questions are set in a virtual lab-style environment that tests applied knowledge rather than rote recall. The exam is delivered online and is remotely proctored, allowing candidates to sit from any location with a compatible internet connection.
The passing score is 65% or higher. Registration is continuous—there are no application windows or deadlines—and candidates can schedule a testing appointment as early as 48 hours after payment of the exam fee. Exam eligibility remains valid for 12 months from the date of registration. Appointments can be scheduled up to 90 days in advance, and free rescheduling is permitted with at least 48 hours' notice. The exam fee is US$175 for ISACA members and US$225 for non-members.
Earning the IT Risk Fundamentals Certificate signals to employers a verified baseline competency in IT risk management, making candidates more competitive for roles such as IT risk analyst, compliance analyst, IT auditor, and risk assessment consultant. Because the credential is issued by ISACA—a globally recognized authority in IT governance, risk, and audit—it carries credibility across industries including financial services, healthcare, government, and technology. The certificate is particularly valuable as a credential for professionals transitioning into risk-focused roles or seeking to differentiate themselves early in their careers.
The IT Risk Fundamentals Certificate is explicitly positioned by ISACA as a pathway toward the Certified in Risk and Information Systems Control (CRISC) certification, one of the most valued and highest-paying IT certifications globally; CRISC holders report average salaries exceeding $150,000 annually. The foundational certificate itself strengthens candidacy for IT risk roles that typically command salaries in the $85,000–$120,000 range, depending on geography and experience level. Demand for IT risk professionals continues to grow as organizations face increasing regulatory requirements, cyber threats, and digital transformation risks.
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 616 questions.
1. A hospital evaluates control effectiveness for protecting electronic protected health information (ePHI) to comply with HIPAA Security Rule requirements. The current access control system has 65 percent effectiveness but covers 100 percent of all ePHI systems. The hospital considers replacing it with a new system offering 100 percent effectiveness but initially covering only 40 percent of ePHI systems due to compatibility limitations. Which solution provides better overall risk reduction? (Select one!)
Explanation
Overall control effectiveness is the product of control strength and coverage. The current system provides 65 percent times 100 percent equals 65 percent overall protection. The new system provides 100 percent times 40 percent equals 40 percent overall protection. The current system with 65 percent overall effectiveness provides better risk reduction than the new system with 40 percent overall effectiveness. Partial coverage creates significant gaps where 60 percent of ePHI systems would have no protection under the new system. High effectiveness on a small subset of systems leaves the majority of assets vulnerable. Control strength and coverage are not independent factors, they multiply to determine overall effectiveness. Implementing compensating detective controls does not address the comparative analysis between the two preventive control options presented. This scenario illustrates that comprehensive coverage with moderate effectiveness often provides superior protection compared to excellent effectiveness with limited coverage.
2. A technology startup evaluates its maximum financial loss tolerance before business failure at 5 million USD, sets its strategic willingness to accept risk at 3 million USD, and allows individual business units to deviate by 500,000 USD from strategic targets. Which terms correctly match these three values in descending order? (Select one!)
Explanation
Risk capacity is the absolute maximum risk an organization can absorb before failure, making 5 million USD the capacity. Risk appetite is the broad strategic amount of risk the organization is willing to accept in pursuit of objectives, set by the Board at 3 million USD. Risk tolerance is the acceptable operational deviation from risk appetite, represented by the 500,000 USD allowed variance at business unit level. The hierarchy is always Risk Capacity greater than or equal to Risk Tolerance greater than or equal to Risk Appetite. Other options incorrectly sequence these fundamental risk governance concepts.
3. An investment management firm establishes recovery objectives for its portfolio management system. The business impact analysis determines that the firm can tolerate a maximum of 2 hours of system unavailability before client obligations are breached and regulatory violations occur. Which recovery metric defines this maximum tolerable period of disruption? (Select one!)
Explanation
Maximum Tolerable Downtime (MTD), also called Maximum Tolerable Period of Disruption (MTPD), defines the absolute maximum time a business function can be unavailable before the organization faces catastrophic consequences such as business failure, regulatory violations, or contractual breaches. Recovery Time Objective is the target time to restore a function but must be less than MTD. Recovery Point Objective measures maximum acceptable data loss in time units. Work Recovery Time is the time needed to recover lost work or backlog after systems are restored.
4. An organization suffered a malware infection that encrypted critical databases. The IT team must decide whether to preserve forensic evidence or rapidly restore operations from backups. Management prioritizes getting systems operational within 4 hours. What is the PRIMARY trade-off in this decision? (Select one!)
Explanation
The primary trade-off is between preserving forensic evidence for investigation versus meeting recovery time objectives through rapid system restoration. Restoring systems quickly often destroys or overwrites forensic evidence needed to determine attack vectors, identify attackers, and prevent recurrence. This is a common exam trap: rapid restoration prioritization can compromise evidence collection. The incident response priority should be: contain threat, preserve evidence, eradicate threat, recover systems, lessons learned. However, business continuity pressures often force rapid restoration at the expense of thorough investigation. This decision must be made consciously with awareness of the trade-offs.
5. During a control assessment, an auditor discovers that the organization has implemented a well-designed encryption control for data at rest, but the encryption keys are stored on the same server as the encrypted data without additional protection. How should this finding be classified? (Select one!)
Explanation
This represents an operating effectiveness deficiency. The encryption control is well-designed in principle, but it is not operating as intended because storing keys alongside encrypted data negates the security benefit. The control design itself is appropriate, but the implementation undermines its effectiveness. A design deficiency would mean the control concept itself was inappropriate. This is not about compensating controls but rather improper implementation of the primary control. The practice violates fundamental security principles and is not acceptable.
One-time access to this exam