ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 112

Question list
Search
Search

List of questions

Search

Related questions











When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?

A.
Define metrics for restoring availability.
A.
Define metrics for restoring availability.
Answers
B.
Identify conditions that may cause disruptions.
B.
Identify conditions that may cause disruptions.
Answers
C.
Review incident response procedures.
C.
Review incident response procedures.
Answers
D.
Evaluate the probability of risk events.
D.
Evaluate the probability of risk events.
Answers
Suggested answer: B

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

A.
Do not collect or retain data that is not needed.
A.
Do not collect or retain data that is not needed.
Answers
B.
Redact data where possible.
B.
Redact data where possible.
Answers
C.
Limit access to the personal data.
C.
Limit access to the personal data.
Answers
D.
Ensure all data is encrypted at rest and during transit.
D.
Ensure all data is encrypted at rest and during transit.
Answers
Suggested answer: D

Which of the following has the GREATEST influence on an organization's risk appetite?

A.
Threats and vulnerabilities
A.
Threats and vulnerabilities
Answers
B.
Internal and external risk factors
B.
Internal and external risk factors
Answers
C.
Business objectives and strategies
C.
Business objectives and strategies
Answers
D.
Management culture and behavior
D.
Management culture and behavior
Answers
Suggested answer: D

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.
Verify that existing controls continue to properly mitigate defined risk
A.
Verify that existing controls continue to properly mitigate defined risk
Answers
B.
Test approval process controls once the project is completed
B.
Test approval process controls once the project is completed
Answers
C.
Update the existing controls for changes in approval processes from this project
C.
Update the existing controls for changes in approval processes from this project
Answers
D.
Perform a gap analysis of the impacted control processes
D.
Perform a gap analysis of the impacted control processes
Answers
Suggested answer: B

Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?

A.
The cost associated with incident response activities The composition and number of records in the information asset
A.
The cost associated with incident response activities The composition and number of records in the information asset
Answers
B.
The maximum levels of applicable regulatory fines
B.
The maximum levels of applicable regulatory fines
Answers
C.
The length of time between identification and containment of the incident
C.
The length of time between identification and containment of the incident
Answers
Suggested answer: C

Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?

A.
A centralized computer security response team
A.
A centralized computer security response team
Answers
B.
Regular performance reviews and management check-ins
B.
Regular performance reviews and management check-ins
Answers
C.
Code of ethics training for all employees
C.
Code of ethics training for all employees
Answers
D.
Communication of employee activity monitoring
D.
Communication of employee activity monitoring
Answers
Suggested answer: D

Reviewing which of the following BEST helps an organization gam insight into its overall risk profile''

A.
Risk register
A.
Risk register
Answers
B.
Risk appetite
B.
Risk appetite
Answers
C.
Threat landscape
C.
Threat landscape
Answers
D.
Risk metrics
D.
Risk metrics
Answers
Suggested answer: B

Which of the following is the GREATEST benefit of a three lines of defense structure?

A.
An effective risk culture that empowers employees to report risk
A.
An effective risk culture that empowers employees to report risk
Answers
B.
Effective segregation of duties to prevent internal fraud
B.
Effective segregation of duties to prevent internal fraud
Answers
C.
Clear accountability for risk management processes
C.
Clear accountability for risk management processes
Answers
D.
Improved effectiveness and efficiency of business operations
D.
Improved effectiveness and efficiency of business operations
Answers
Suggested answer: C

Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?

A.
User acceptance testing (UAT)
A.
User acceptance testing (UAT)
Answers
B.
Database activity monitoring
B.
Database activity monitoring
Answers
C.
Source code review
C.
Source code review
Answers
D.
Vulnerability analysis
D.
Vulnerability analysis
Answers
Suggested answer: B

Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?

A.
To align with board reporting requirements
A.
To align with board reporting requirements
Answers
B.
To assist management in decision making
B.
To assist management in decision making
Answers
C.
To create organization-wide risk awareness
C.
To create organization-wide risk awareness
Answers
D.
To minimize risk mitigation efforts
D.
To minimize risk mitigation efforts
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120