ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 116

Question list
Search
Search

Related questions











After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

A.
A decrease in threats
A.
A decrease in threats
Answers
B.
A change in the risk profile
B.
A change in the risk profile
Answers
C.
An increase in reported vulnerabilities
C.
An increase in reported vulnerabilities
Answers
D.
An increase in identified risk scenarios
D.
An increase in identified risk scenarios
Answers
Suggested answer: B

Which of the following would MOST likely cause management to unknowingly accept excessive risk?

A.
Satisfactory audit results
A.
Satisfactory audit results
Answers
B.
Risk tolerance being set too low
B.
Risk tolerance being set too low
Answers
C.
Inaccurate risk ratings
C.
Inaccurate risk ratings
Answers
D.
Lack of preventive controls
D.
Lack of preventive controls
Answers
Suggested answer: C

An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?

A.
Risk likelihood
A.
Risk likelihood
Answers
B.
Risk culture
B.
Risk culture
Answers
C.
Risk appetite
C.
Risk appetite
Answers
D.
Risk capacity
D.
Risk capacity
Answers
Suggested answer: A

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

A.
introduced into production without high-risk issues.
A.
introduced into production without high-risk issues.
Answers
B.
having the risk register updated regularly.
B.
having the risk register updated regularly.
Answers
C.
having key risk indicators (KRIs) established to measure risk.
C.
having key risk indicators (KRIs) established to measure risk.
Answers
D.
having an action plan to remediate overdue issues.
D.
having an action plan to remediate overdue issues.
Answers
Suggested answer: A

Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?

A.
Recovery time objective (RTO)
A.
Recovery time objective (RTO)
Answers
B.
Cost-benefit analysis
B.
Cost-benefit analysis
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Cyber insurance coverage
D.
Cyber insurance coverage
Answers
Suggested answer: C

Which of the following is the result of a realized risk scenario?

A.
Threat event
A.
Threat event
Answers
B.
Vulnerability event
B.
Vulnerability event
Answers
C.
Technical event
C.
Technical event
Answers
D.
Loss event
D.
Loss event
Answers
Suggested answer: D

Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?

A.
Use an encrypted tunnel lo connect to the cloud.
A.
Use an encrypted tunnel lo connect to the cloud.
Answers
B.
Encrypt the data in the cloud database.
B.
Encrypt the data in the cloud database.
Answers
C.
Encrypt physical hard drives within the cloud.
C.
Encrypt physical hard drives within the cloud.
Answers
D.
Encrypt data before it leaves the organization.
D.
Encrypt data before it leaves the organization.
Answers
Suggested answer: D

When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?

A.
Results of benchmarking studies
A.
Results of benchmarking studies
Answers
B.
Results of risk assessments
B.
Results of risk assessments
Answers
C.
Number of emergency change requests
C.
Number of emergency change requests
Answers
D.
Maturity model
D.
Maturity model
Answers
Suggested answer: B

Which of the following should be the PRIMARY input to determine risk tolerance?

A.
Regulatory requirements
A.
Regulatory requirements
Answers
B.
Organizational objectives
B.
Organizational objectives
Answers
C.
Annual loss expectancy (ALE)
C.
Annual loss expectancy (ALE)
Answers
D.
Risk management costs
D.
Risk management costs
Answers
Suggested answer: C

Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?

A.
To identify gaps in data protection controls
A.
To identify gaps in data protection controls
Answers
B.
To develop a customer notification plan
B.
To develop a customer notification plan
Answers
C.
To identify personally identifiable information (Pll)
C.
To identify personally identifiable information (Pll)
Answers
D.
To determine gaps in data identification processes
D.
To determine gaps in data identification processes
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120