ExamGecko
Home / Isaca / CRISC / List of questions
Ask Question

Isaca CRISC Practice Test - Questions Answers, Page 129

List of questions

Question 1281

Report Export Collapse

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 1282

Report Export Collapse

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for sensitive data?

Become a Premium Member for full access
  Unlock Premium Member

Question 1283

Report Export Collapse

Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?

Become a Premium Member for full access
  Unlock Premium Member

Question 1284

Report Export Collapse

A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?

Become a Premium Member for full access
  Unlock Premium Member

Question 1285

Report Export Collapse

Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?

Become a Premium Member for full access
  Unlock Premium Member

Question 1286

Report Export Collapse

The BEST way for management to validate whether risk response activities have been completed is to review:

Become a Premium Member for full access
  Unlock Premium Member

Question 1287

Report Export Collapse

Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?

Become a Premium Member for full access
  Unlock Premium Member

Question 1288

Report Export Collapse

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?

Become a Premium Member for full access
  Unlock Premium Member

Question 1289

Report Export Collapse

A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?

Become a Premium Member for full access
  Unlock Premium Member

Question 1290

Report Export Collapse

Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.573 questions
Go to page: of 158
Search

Related questions