Isaca CRISC Practice Test - Questions Answers, Page 3
List of questions
Which of the following would BEST help to ensure that identified risk is efficiently managed?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
Which of the following is the MAIN reason for documenting the performance of controls?
When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?
Which of the following attributes of a key risk indicator (KRI) is MOST important?
Question