ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 13

Question list
Search
Search

Related questions











The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:

A.
implement uniform controls for common risk scenarios.
A.
implement uniform controls for common risk scenarios.
Answers
B.
ensure business unit risk is uniformly distributed.
B.
ensure business unit risk is uniformly distributed.
Answers
C.
build a risk profile for management review.
C.
build a risk profile for management review.
Answers
D.
quantify the organization's risk appetite.
D.
quantify the organization's risk appetite.
Answers
Suggested answer: C

To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?

A.
Threshold definition
A.
Threshold definition
Answers
B.
Escalation procedures
B.
Escalation procedures
Answers
C.
Automated data feed
C.
Automated data feed
Answers
D.
Controls monitoring
D.
Controls monitoring
Answers
Suggested answer: A

An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?

A.
Perform a risk assessment
A.
Perform a risk assessment
Answers
B.
Disable user access.
B.
Disable user access.
Answers
C.
Develop an access control policy.
C.
Develop an access control policy.
Answers
D.
Perform root cause analysis.
D.
Perform root cause analysis.
Answers
Suggested answer: B

Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization's current risk profile?

A.
Hire consultants specializing m the new technology.
A.
Hire consultants specializing m the new technology.
Answers
B.
Review existing risk mitigation controls.
B.
Review existing risk mitigation controls.
Answers
C.
Conduct a gap analysis.
C.
Conduct a gap analysis.
Answers
D.
Perform a risk assessment.
D.
Perform a risk assessment.
Answers
Suggested answer: D

Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?

A.
impact due to failure of control
A.
impact due to failure of control
Answers
B.
Frequency of failure of control
B.
Frequency of failure of control
Answers
C.
Contingency plan for residual risk
C.
Contingency plan for residual risk
Answers
D.
Cost-benefit analysis of automation
D.
Cost-benefit analysis of automation
Answers
Suggested answer: D

Which of the following is the BEST course of action to reduce risk impact?

A.
Create an IT security policy.
A.
Create an IT security policy.
Answers
B.
Implement corrective measures.
B.
Implement corrective measures.
Answers
C.
Implement detective controls.
C.
Implement detective controls.
Answers
D.
Leverage existing technology
D.
Leverage existing technology
Answers
Suggested answer: B

The PRIMARY advantage of implementing an IT risk management framework is the:

A.
establishment of a reliable basis for risk-aware decision making.
A.
establishment of a reliable basis for risk-aware decision making.
Answers
B.
compliance with relevant legal and regulatory requirements.
B.
compliance with relevant legal and regulatory requirements.
Answers
C.
improvement of controls within the organization and minimized losses.
C.
improvement of controls within the organization and minimized losses.
Answers
D.
alignment of business goals with IT objectives.
D.
alignment of business goals with IT objectives.
Answers
Suggested answer: A

Which of the following is the BEST indication of an effective risk management program?

A.
Risk action plans are approved by senior management.
A.
Risk action plans are approved by senior management.
Answers
B.
Residual risk is within the organizational risk appetite
B.
Residual risk is within the organizational risk appetite
Answers
C.
Mitigating controls are designed and implemented.
C.
Mitigating controls are designed and implemented.
Answers
D.
Risk is recorded and tracked in the risk register
D.
Risk is recorded and tracked in the risk register
Answers
Suggested answer: B

An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?

A.
The third party s management
A.
The third party s management
Answers
B.
The organization's management
B.
The organization's management
Answers
C.
The control operators at the third party
C.
The control operators at the third party
Answers
D.
The organization's vendor management office
D.
The organization's vendor management office
Answers
Suggested answer: B

The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

A.
align with audit results.
A.
align with audit results.
Answers
B.
benchmark with competitor s actions.
B.
benchmark with competitor s actions.
Answers
C.
reference best practice.
C.
reference best practice.
Answers
D.
focus on the business drivers
D.
focus on the business drivers
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120