ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 26

Question list
Search
Search

List of questions

Search

Related questions











Which of the following is a KEY responsibility of the second line of defense?

A.
Implementing control activities
A.
Implementing control activities
Answers
B.
Monitoring control effectiveness
B.
Monitoring control effectiveness
Answers
C.
Conducting control self-assessments
C.
Conducting control self-assessments
Answers
D.
Owning risk scenarios
D.
Owning risk scenarios
Answers
Suggested answer: B

A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?

A.
Evaluate the relevance of the evolving threats.
A.
Evaluate the relevance of the evolving threats.
Answers
B.
Review past internal audit results.
B.
Review past internal audit results.
Answers
C.
Respond to organizational security threats.
C.
Respond to organizational security threats.
Answers
D.
Research industry published studies.
D.
Research industry published studies.
Answers
Suggested answer: A

A new regulator/ requirement imposes severe fines for data leakage involving customers' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?

A.
Reduce retention periods for Pll data.
A.
Reduce retention periods for Pll data.
Answers
B.
Move Pll to a highly-secured outsourced site.
B.
Move Pll to a highly-secured outsourced site.
Answers
C.
Modify business processes to stop collecting Pll.
C.
Modify business processes to stop collecting Pll.
Answers
D.
Implement strong encryption for Pll.
D.
Implement strong encryption for Pll.
Answers
Suggested answer: C

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

A.
Risk exposure expressed in business terms
A.
Risk exposure expressed in business terms
Answers
B.
Recommendations for risk response options
B.
Recommendations for risk response options
Answers
C.
Resource requirements for risk responses
C.
Resource requirements for risk responses
Answers
D.
List of business areas affected by the risk
D.
List of business areas affected by the risk
Answers
Suggested answer: A

Which of the following is MOST important to enable well-informed cybersecurity risk decisions?

A.
Determine and understand the risk rating of scenarios.
A.
Determine and understand the risk rating of scenarios.
Answers
B.
Conduct risk assessment peer reviews.
B.
Conduct risk assessment peer reviews.
Answers
C.
Identify roles and responsibilities for security controls.
C.
Identify roles and responsibilities for security controls.
Answers
D.
Engage a third party to perform a risk assessment.
D.
Engage a third party to perform a risk assessment.
Answers
Suggested answer: A

An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?

A.
Feedback from end users
A.
Feedback from end users
Answers
B.
Results of a benchmark analysis
B.
Results of a benchmark analysis
Answers
C.
Recommendations from internal audit
C.
Recommendations from internal audit
Answers
D.
Prioritization from business owners
D.
Prioritization from business owners
Answers
Suggested answer: D

When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?

A.
Unclear organizational risk appetite
A.
Unclear organizational risk appetite
Answers
B.
Lack of senior management participation
B.
Lack of senior management participation
Answers
C.
Use of highly customized control frameworks
C.
Use of highly customized control frameworks
Answers
D.
Reliance on qualitative analysis methods
D.
Reliance on qualitative analysis methods
Answers
Suggested answer: C

Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

A.
An updated risk register
A.
An updated risk register
Answers
B.
Risk assessment results
B.
Risk assessment results
Answers
C.
Technical control validation
C.
Technical control validation
Answers
D.
Control testing results
D.
Control testing results
Answers
Suggested answer: D

A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?

A.
Increase in compliance breaches
A.
Increase in compliance breaches
Answers
B.
Increase in loss event impact
B.
Increase in loss event impact
Answers
C.
Increase in residual risk
C.
Increase in residual risk
Answers
D.
Increase in customer complaints
D.
Increase in customer complaints
Answers
Suggested answer: B

The BEST criteria when selecting a risk response is the:

A.
capability to implement the response
A.
capability to implement the response
Answers
B.
importance of IT risk within the enterprise
B.
importance of IT risk within the enterprise
Answers
C.
effectiveness of risk response options
C.
effectiveness of risk response options
Answers
D.
alignment of response to industry standards
D.
alignment of response to industry standards
Answers
Suggested answer: C
Total 1.200 questions
Go to page: of 120