Isaca CRISC Practice Test - Questions Answers, Page 147
List of questions
Question 1461
When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:
Question 1462
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Question 1463
Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
Question 1464
Which of the following is the MOST useful information for prioritizing risk mitigation?
Question 1465
A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?
Question 1466
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
Question 1467
An organization's board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?
Question 1468
Which of the following is the MOST reliable validation of a new control?
Question 1469
Which of the following would BEST indicate to senior management that IT processes are improving?
Question 1470
A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Question