ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 107

Question list
Search
Search

Related questions











Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?

A.
Configuration validation
A.
Configuration validation
Answers
B.
Control attestation
B.
Control attestation
Answers
C.
Penetration testing
C.
Penetration testing
Answers
D.
Internal audit review
D.
Internal audit review
Answers
Suggested answer: A

A recent big data project has resulted in the creation of an application used to support important investment decisions. Which of the following should be of GREATEST concern to the risk practitioner?

A.
Data quality
A.
Data quality
Answers
B.
Maintenance costs
B.
Maintenance costs
Answers
C.
Data redundancy
C.
Data redundancy
Answers
D.
System integration
D.
System integration
Answers
Suggested answer: A

Which of the following presents the GREATEST challenge to managing an organization's end-user devices?

A.
Incomplete end-user device inventory
A.
Incomplete end-user device inventory
Answers
B.
Unsupported end-user applications
B.
Unsupported end-user applications
Answers
C.
Incompatible end-user devices
C.
Incompatible end-user devices
Answers
D.
Multiple end-user device models
D.
Multiple end-user device models
Answers
Suggested answer: A

Which of the following is the result of a realized risk scenario?

A.
Technical event
A.
Technical event
Answers
B.
Threat event
B.
Threat event
Answers
C.
Vulnerability event
C.
Vulnerability event
Answers
D.
Loss event
D.
Loss event
Answers
Suggested answer: D

Which of the following is the MOST important outcome of a business impact analysis (BIA)?

A.
Understanding and prioritization of critical processes
A.
Understanding and prioritization of critical processes
Answers
B.
Completion of the business continuity plan (BCP)
B.
Completion of the business continuity plan (BCP)
Answers
C.
Identification of regulatory consequences
C.
Identification of regulatory consequences
Answers
D.
Reduction of security and business continuity threats
D.
Reduction of security and business continuity threats
Answers
Suggested answer: A

Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

A.
possible risk and suggested mitigation plans.
A.
possible risk and suggested mitigation plans.
Answers
B.
design of controls to encrypt the data to be shared.
B.
design of controls to encrypt the data to be shared.
Answers
C.
project plan for classification of the data.
C.
project plan for classification of the data.
Answers
D.
summary of data protection and privacy legislation.
D.
summary of data protection and privacy legislation.
Answers
Suggested answer: A

Which of the following is MOST important for successful incident response?

A.
The quantity of data logged by the attack control tools
A.
The quantity of data logged by the attack control tools
Answers
B.
Blocking the attack route immediately
B.
Blocking the attack route immediately
Answers
C.
The ability to trace the source of the attack
C.
The ability to trace the source of the attack
Answers
D.
The timeliness of attack recognition
D.
The timeliness of attack recognition
Answers
Suggested answer: D

Which of The following BEST represents the desired risk posture for an organization?

A.
Inherent risk is lower than risk tolerance.
A.
Inherent risk is lower than risk tolerance.
Answers
B.
Operational risk is higher than risk tolerance.
B.
Operational risk is higher than risk tolerance.
Answers
C.
Accepted risk is higher than risk tolerance.
C.
Accepted risk is higher than risk tolerance.
Answers
D.
Residual risk is lower than risk tolerance.
D.
Residual risk is lower than risk tolerance.
Answers
Suggested answer: D

An organization is adopting blockchain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?

A.
Limited organizational knowledge of the underlying technology
A.
Limited organizational knowledge of the underlying technology
Answers
B.
Lack of commercial software support
B.
Lack of commercial software support
Answers
C.
Varying costs related to implementation and maintenance
C.
Varying costs related to implementation and maintenance
Answers
D.
Slow adoption of the technology across the financial industry
D.
Slow adoption of the technology across the financial industry
Answers
Suggested answer: A

Which of the following should be the PRIMARY basis for prioritizing risk responses?

A.
The impact of the risk
A.
The impact of the risk
Answers
B.
The replacement cost of the business asset
B.
The replacement cost of the business asset
Answers
C.
The cost of risk mitigation controls
C.
The cost of risk mitigation controls
Answers
D.
The classification of the business asset
D.
The classification of the business asset
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120