ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 113

Question list
Search
Search

Related questions











The MAJOR reason to classify information assets is

A.
maintain a current inventory and catalog of information assets
A.
maintain a current inventory and catalog of information assets
Answers
B.
determine their sensitivity and critical
B.
determine their sensitivity and critical
Answers
C.
establish recovery time objectives (RTOs)
C.
establish recovery time objectives (RTOs)
Answers
D.
categorize data into groups
D.
categorize data into groups
Answers
Suggested answer: C

Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors

A.
Frequency of business continuity plan (BCP) lasting
A.
Frequency of business continuity plan (BCP) lasting
Answers
B.
Frequency and number of new software releases
B.
Frequency and number of new software releases
Answers
C.
Frequency and duration of unplanned downtime
C.
Frequency and duration of unplanned downtime
Answers
D.
Number of IT support staff available after business hours
D.
Number of IT support staff available after business hours
Answers
Suggested answer: C

An organization recently configured a new business division Which of the following is MOST likely to be affected?

A.
Risk profile
A.
Risk profile
Answers
B.
Risk culture
B.
Risk culture
Answers
C.
Risk appetite
C.
Risk appetite
Answers
D.
Risk tolerance
D.
Risk tolerance
Answers
Suggested answer: A

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.
Prioritizing and addressing risk in line with risk appetite . Eliminating risk through preventive and detective controls
A.
Prioritizing and addressing risk in line with risk appetite . Eliminating risk through preventive and detective controls
Answers
B.
Considering risk that can be shared with a third party
B.
Considering risk that can be shared with a third party
Answers
C.
Evaluating the probability and impact of risk scenarios
C.
Evaluating the probability and impact of risk scenarios
Answers
Suggested answer: A

A MAJOR advantage of using key risk indicators (KRis) is that (hey

A.
identify when risk exceeds defined thresholds
A.
identify when risk exceeds defined thresholds
Answers
B.
assess risk scenarios that exceed defined thresholds
B.
assess risk scenarios that exceed defined thresholds
Answers
C.
identify scenarios that exceed defined risk appetite
C.
identify scenarios that exceed defined risk appetite
Answers
D.
help with internal control assessments concerning risk appellate
D.
help with internal control assessments concerning risk appellate
Answers
Suggested answer: B

Who is MOST appropriate to be assigned ownership of a control

A.
The individual responsible for control operation
A.
The individual responsible for control operation
Answers
B.
The individual informed of the control effectiveness
B.
The individual informed of the control effectiveness
Answers
C.
The individual responsible for resting the control
C.
The individual responsible for resting the control
Answers
D.
The individual accountable for monitoring control effectiveness
D.
The individual accountable for monitoring control effectiveness
Answers
Suggested answer: D

Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application'?

A.
The third-party risk manager
A.
The third-party risk manager
Answers
B.
The application vendor
B.
The application vendor
Answers
C.
The business process owner
C.
The business process owner
Answers
D.
The information security manager
D.
The information security manager
Answers
Suggested answer: B

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

A.
Review historical application down me and frequency
A.
Review historical application down me and frequency
Answers
B.
Assess the potential impact and cost of mitigation
B.
Assess the potential impact and cost of mitigation
Answers
C.
identify other legacy systems within the organization
C.
identify other legacy systems within the organization
Answers
D.
Explore the feasibility of replacing the legacy system
D.
Explore the feasibility of replacing the legacy system
Answers
Suggested answer: B

Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?

A.
Risk mitigation plans
A.
Risk mitigation plans
Answers
B.
heat map
B.
heat map
Answers
C.
Risk appetite statement
C.
Risk appetite statement
Answers
D.
Key risk indicators (KRls)
D.
Key risk indicators (KRls)
Answers
Suggested answer: B

Which of the following would be of GREATEST concern regarding an organization's asset management?

A.
Lack of a mature records management program
A.
Lack of a mature records management program
Answers
B.
Lack of a dedicated asset management team
B.
Lack of a dedicated asset management team
Answers
C.
Decentralized asset lists
C.
Decentralized asset lists
Answers
D.
Incomplete asset inventory
D.
Incomplete asset inventory
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120