ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 114

Question list
Search
Search

List of questions

Search

Related questions











To define the risk management strategy which of the following MUST be set by the board of directors?

A.
Operational strategies
A.
Operational strategies
Answers
B.
Risk governance
B.
Risk governance
Answers
C.
Annualized loss expectancy (ALE)
C.
Annualized loss expectancy (ALE)
Answers
D.
Risk appetite
D.
Risk appetite
Answers
Suggested answer: B

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

A.
The risk practitioner
A.
The risk practitioner
Answers
B.
The risk owner
B.
The risk owner
Answers
C.
The control owner
C.
The control owner
Answers
D.
The audit manager
D.
The audit manager
Answers
Suggested answer: A

Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?

A.
Improved alignment will technical risk
A.
Improved alignment will technical risk
Answers
B.
Better-informed business decisions
B.
Better-informed business decisions
Answers
C.
Enhanced understanding of enterprise architecture (EA)
C.
Enhanced understanding of enterprise architecture (EA)
Answers
D.
Improved business operations efficiency
D.
Improved business operations efficiency
Answers
Suggested answer: C

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'

A.
Identify the regulatory bodies that may highlight this gap
A.
Identify the regulatory bodies that may highlight this gap
Answers
B.
Highlight news articles about data breaches
B.
Highlight news articles about data breaches
Answers
C.
Evaluate the risk as a measure of probable loss
C.
Evaluate the risk as a measure of probable loss
Answers
D.
Verify if competitors comply with a similar policy
D.
Verify if competitors comply with a similar policy
Answers
Suggested answer: B

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

A.
Update firewall configuration
A.
Update firewall configuration
Answers
B.
Require strong password complexity
B.
Require strong password complexity
Answers
C.
implement a security awareness program
C.
implement a security awareness program
Answers
D.
Implement two-factor authentication
D.
Implement two-factor authentication
Answers
Suggested answer: A

During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?

A.
Schedule periodic reviews of the compensating controls' effectiveness.
A.
Schedule periodic reviews of the compensating controls' effectiveness.
Answers
B.
Report the use of compensating controls to senior management.
B.
Report the use of compensating controls to senior management.
Answers
C.
Recommend additional IT controls to further reduce residual risk.
C.
Recommend additional IT controls to further reduce residual risk.
Answers
D.
Request that ownership of the compensating controls is reassigned to IT
D.
Request that ownership of the compensating controls is reassigned to IT
Answers
Suggested answer: A

Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?

A.
Risk owner
A.
Risk owner
Answers
B.
Risk practitioner
B.
Risk practitioner
Answers
C.
Compliance manager
C.
Compliance manager
Answers
D.
Control owner
D.
Control owner
Answers
Suggested answer: B

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.
Escalate to senior management.
A.
Escalate to senior management.
Answers
B.
Transfer the risk.
B.
Transfer the risk.
Answers
C.
Implement monitoring controls.
C.
Implement monitoring controls.
Answers
D.
Recalculate the risk.
D.
Recalculate the risk.
Answers
Suggested answer: D

Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?

A.
Standards-based policies
A.
Standards-based policies
Answers
B.
Audit readiness
B.
Audit readiness
Answers
C.
Efficient operations
C.
Efficient operations
Answers
D.
Regulatory compliance
D.
Regulatory compliance
Answers
Suggested answer: C

Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?

A.
Incident reports
A.
Incident reports
Answers
B.
Cost-benefit analysis
B.
Cost-benefit analysis
Answers
C.
Risk tolerance
C.
Risk tolerance
Answers
D.
Control objectives
D.
Control objectives
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120