ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 16

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?

A.
Directives from legal and regulatory authorities
A.
Directives from legal and regulatory authorities
Answers
B.
Audit reports from internal information systems audits
B.
Audit reports from internal information systems audits
Answers
C.
Automated logs collected from different systems
C.
Automated logs collected from different systems
Answers
D.
Trend analysis of external risk factors
D.
Trend analysis of external risk factors
Answers
Suggested answer: C

When reviewing management's IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?

A.
Assess management's risk tolerance.
A.
Assess management's risk tolerance.
Answers
B.
Recommend management accept the low risk scenarios.
B.
Recommend management accept the low risk scenarios.
Answers
C.
Propose mitigating controls
C.
Propose mitigating controls
Answers
D.
Re-evaluate the risk scenarios associated with the control
D.
Re-evaluate the risk scenarios associated with the control
Answers
Suggested answer: D

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

A.
Data controllers
A.
Data controllers
Answers
B.
Data processors
B.
Data processors
Answers
C.
Data custodians
C.
Data custodians
Answers
D.
Data owners
D.
Data owners
Answers
Suggested answer: B

During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?

A.
Describe IT risk scenarios in terms of business risk.
A.
Describe IT risk scenarios in terms of business risk.
Answers
B.
Recommend the formation of an executive risk council to oversee IT risk.
B.
Recommend the formation of an executive risk council to oversee IT risk.
Answers
C.
Provide an estimate of IT system downtime if IT risk materializes.
C.
Provide an estimate of IT system downtime if IT risk materializes.
Answers
D.
Educate business executives on IT risk concepts.
D.
Educate business executives on IT risk concepts.
Answers
Suggested answer: A

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

A.
Risk appetite statement
A.
Risk appetite statement
Answers
B.
Enterprise risk management framework
B.
Enterprise risk management framework
Answers
C.
Risk management policies
C.
Risk management policies
Answers
D.
Risk register
D.
Risk register
Answers
Suggested answer: D

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

A.
Service level agreement
A.
Service level agreement
Answers
B.
Customer service reviews
B.
Customer service reviews
Answers
C.
Scope of services provided
C.
Scope of services provided
Answers
D.
Right to audit the provider
D.
Right to audit the provider
Answers
Suggested answer: D

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

A.
Develop a compensating control.
A.
Develop a compensating control.
Answers
B.
Allocate remediation resources.
B.
Allocate remediation resources.
Answers
C.
Perform a cost-benefit analysis.
C.
Perform a cost-benefit analysis.
Answers
D.
Identify risk responses
D.
Identify risk responses
Answers
Suggested answer: D

During testing, a risk practitioner finds the IT department's recovery time objective (RTO) for a key system does not align with the enterprise's business continuity plan (BCP). Which of the following should be done NEXT?

A.
Report the gap to senior management
A.
Report the gap to senior management
Answers
B.
Consult with the IT department to update the RTO
B.
Consult with the IT department to update the RTO
Answers
C.
Complete a risk exception form.
C.
Complete a risk exception form.
Answers
D.
Consult with the business owner to update the BCP
D.
Consult with the business owner to update the BCP
Answers
Suggested answer: A

A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?

A.
The percentage of systems meeting recovery target times has increased.
A.
The percentage of systems meeting recovery target times has increased.
Answers
B.
The number of systems tested in the last year has increased.
B.
The number of systems tested in the last year has increased.
Answers
C.
The number of systems requiring a recovery plan has increased.
C.
The number of systems requiring a recovery plan has increased.
Answers
D.
The percentage of systems with long recovery target times has decreased.
D.
The percentage of systems with long recovery target times has decreased.
Answers
Suggested answer: D

Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?

A.
Key risk indicator (KRI) thresholds
A.
Key risk indicator (KRI) thresholds
Answers
B.
Inherent risk
B.
Inherent risk
Answers
C.
Risk likelihood and impact
C.
Risk likelihood and impact
Answers
D.
Risk velocity
D.
Risk velocity
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120