ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 102

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?

A.
Use production data in a non-production environment
A.
Use production data in a non-production environment
Answers
B.
Use masked data in a non-production environment
B.
Use masked data in a non-production environment
Answers
C.
Use test data in a production environment
C.
Use test data in a production environment
Answers
D.
Use anonymized data in a non-production environment
D.
Use anonymized data in a non-production environment
Answers
Suggested answer: D

An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:

A.
risk mitigation.
A.
risk mitigation.
Answers
B.
risk evaluation.
B.
risk evaluation.
Answers
C.
risk appetite.
C.
risk appetite.
Answers
D.
risk tolerance.
D.
risk tolerance.
Answers
Suggested answer: C

Which of the following is the PRIMARY purpose of creating and documenting control procedures?

A.
To facilitate ongoing audit and control testing
A.
To facilitate ongoing audit and control testing
Answers
B.
To help manage risk to acceptable tolerance levels
B.
To help manage risk to acceptable tolerance levels
Answers
C.
To establish and maintain a control inventory
C.
To establish and maintain a control inventory
Answers
D.
To increase the likelihood of effective control operation
D.
To increase the likelihood of effective control operation
Answers
Suggested answer: D

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

A.
Information security officer
A.
Information security officer
Answers
B.
IT risk manager
B.
IT risk manager
Answers
C.
Business owner
C.
Business owner
Answers
D.
Chief risk officer (CRO)
D.
Chief risk officer (CRO)
Answers
Suggested answer: C

During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?

A.
Escalate the non-cooperation to management
A.
Escalate the non-cooperation to management
Answers
B.
Exclude applicable controls from the assessment.
B.
Exclude applicable controls from the assessment.
Answers
C.
Review the supplier's contractual obligations.
C.
Review the supplier's contractual obligations.
Answers
D.
Request risk acceptance from the business process owner.
D.
Request risk acceptance from the business process owner.
Answers
Suggested answer: C

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

A.
The program has not decreased threat counts.
A.
The program has not decreased threat counts.
Answers
B.
The program has not considered business impact.
B.
The program has not considered business impact.
Answers
C.
The program has been significantly revised
C.
The program has been significantly revised
Answers
D.
The program uses non-customized training modules.
D.
The program uses non-customized training modules.
Answers
Suggested answer: D

Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?

A.
Accountability may not be clearly defined.
A.
Accountability may not be clearly defined.
Answers
B.
Risk ratings may be inconsistently applied.
B.
Risk ratings may be inconsistently applied.
Answers
C.
Different risk taxonomies may be used.
C.
Different risk taxonomies may be used.
Answers
D.
Mitigation efforts may be duplicated.
D.
Mitigation efforts may be duplicated.
Answers
Suggested answer: A

When preparing a risk status report for periodic review by senior management, it is MOST important to ensure the report includes

A.
risk exposure in business terms
A.
risk exposure in business terms
Answers
B.
a detailed view of individual risk exposures
B.
a detailed view of individual risk exposures
Answers
C.
a summary of incidents that have impacted the organization.
C.
a summary of incidents that have impacted the organization.
Answers
D.
recommendations by an independent risk assessor.
D.
recommendations by an independent risk assessor.
Answers
Suggested answer: A

Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?

A.
Internal and external audit reports
A.
Internal and external audit reports
Answers
B.
Risk disclosures in financial statements
B.
Risk disclosures in financial statements
Answers
C.
Risk assessment and risk register
C.
Risk assessment and risk register
Answers
D.
Business objectives and strategies
D.
Business objectives and strategies
Answers
Suggested answer: C

An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?

A.
Recommend additional controls to address the risk.
A.
Recommend additional controls to address the risk.
Answers
B.
Update the risk tolerance level to acceptable thresholds.
B.
Update the risk tolerance level to acceptable thresholds.
Answers
C.
Update the incident-related risk trend in the risk register.
C.
Update the incident-related risk trend in the risk register.
Answers
D.
Recommend a root cause analysis of the incidents.
D.
Recommend a root cause analysis of the incidents.
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120