Isaca CRISC Practice Test - Questions Answers, Page 129
List of questions
Question 1281

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?
Question 1282

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for sensitive data?
Question 1283

Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?
Question 1284

A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?
Question 1285

Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
Question 1286

The BEST way for management to validate whether risk response activities have been completed is to review:
Question 1287

Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
Question 1288

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
Question 1289

A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?
Question 1290

Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?
Question