ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 104

Question list
Search
Search

List of questions

Search

Related questions











A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

A.
Enable data encryption in the test environment.
A.
Enable data encryption in the test environment.
Answers
B.
Prevent the use of production data in the test environment
B.
Prevent the use of production data in the test environment
Answers
C.
De-identify data before being transferred to the test environment.
C.
De-identify data before being transferred to the test environment.
Answers
D.
Enforce multi-factor authentication within the test environment.
D.
Enforce multi-factor authentication within the test environment.
Answers
Suggested answer: C

Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?

A.
High percentage of lagging indicators
A.
High percentage of lagging indicators
Answers
B.
Nonexistent benchmark analysis
B.
Nonexistent benchmark analysis
Answers
C.
Incomplete documentation for KRI monitoring
C.
Incomplete documentation for KRI monitoring
Answers
D.
Ineffective methods to assess risk
D.
Ineffective methods to assess risk
Answers
Suggested answer: B

Which of the following provides the MOST useful information to assess the magnitude of identified deficiencies in the IT control environment?

A.
Peer benchmarks
A.
Peer benchmarks
Answers
B.
Internal audit reports
B.
Internal audit reports
Answers
C.
Business impact analysis (BIA) results
C.
Business impact analysis (BIA) results
Answers
D.
Threat analysis results
D.
Threat analysis results
Answers
Suggested answer: D

Which of the following provides the BEST assurance of the effectiveness of vendor security controls?

A.
Review vendor control self-assessments (CSA).
A.
Review vendor control self-assessments (CSA).
Answers
B.
Review vendor service level agreement (SLA) metrics.
B.
Review vendor service level agreement (SLA) metrics.
Answers
C.
Require independent control assessments.
C.
Require independent control assessments.
Answers
D.
Obtain vendor references from existing customers.
D.
Obtain vendor references from existing customers.
Answers
Suggested answer: C

The MAIN purpose of selecting a risk response is to.

A.
ensure compliance with local regulatory requirements
A.
ensure compliance with local regulatory requirements
Answers
B.
demonstrate the effectiveness of risk management practices.
B.
demonstrate the effectiveness of risk management practices.
Answers
C.
ensure organizational awareness of the risk level
C.
ensure organizational awareness of the risk level
Answers
D.
mitigate the residual risk to be within tolerance
D.
mitigate the residual risk to be within tolerance
Answers
Suggested answer: C

Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?

A.
Software version
A.
Software version
Answers
B.
Assigned software manager
B.
Assigned software manager
Answers
C.
Software support contract expiration
C.
Software support contract expiration
Answers
D.
Software licensing information
D.
Software licensing information
Answers
Suggested answer: A

Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?

A.
Deleting the data from the file system
A.
Deleting the data from the file system
Answers
B.
Cryptographically scrambling the data
B.
Cryptographically scrambling the data
Answers
C.
Formatting the cloud storage at the block level
C.
Formatting the cloud storage at the block level
Answers
D.
Degaussing the cloud storage media
D.
Degaussing the cloud storage media
Answers
Suggested answer: B

Which risk response strategy could management apply to both positive and negative risk that has been identified?

A.
Transfer
A.
Transfer
Answers
B.
Accept
B.
Accept
Answers
C.
Exploit
C.
Exploit
Answers
D.
Mitigate
D.
Mitigate
Answers
Suggested answer: B

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

A.
Failure to test the disaster recovery plan (DRP)
A.
Failure to test the disaster recovery plan (DRP)
Answers
B.
Lack of well-documented business impact analysis (BIA)
B.
Lack of well-documented business impact analysis (BIA)
Answers
C.
Lack of annual updates to the disaster recovery plan (DRP)
C.
Lack of annual updates to the disaster recovery plan (DRP)
Answers
D.
Significant changes in management personnel
D.
Significant changes in management personnel
Answers
Suggested answer: A

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

A.
Absorb the loss in productivity.
A.
Absorb the loss in productivity.
Answers
B.
Request a waiver to the requirements.
B.
Request a waiver to the requirements.
Answers
C.
Escalate the issue to senior management
C.
Escalate the issue to senior management
Answers
D.
Remove the control to accommodate business objectives.
D.
Remove the control to accommodate business objectives.
Answers
Suggested answer: C
Total 1.200 questions
Go to page: of 120