Isaca CRISC Practice Test - Questions Answers, Page 147

List of questions
Question 1461

When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:
Question 1462

Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Question 1463

Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
Question 1464

Which of the following is the MOST useful information for prioritizing risk mitigation?
Question 1465

A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?
Question 1466

Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
Question 1467

An organization's board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?
Question 1468

Which of the following is the MOST reliable validation of a new control?
Question 1469

Which of the following would BEST indicate to senior management that IT processes are improving?
Question 1470

A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Question