ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 30

Question list
Search
Search

Related questions











Which of the following is the BEST way to identify changes in the risk profile of an organization?

A.
Monitor key risk indicators (KRIs).
A.
Monitor key risk indicators (KRIs).
Answers
B.
Monitor key performance indicators (KPIs).
B.
Monitor key performance indicators (KPIs).
Answers
C.
Interview the risk owner.
C.
Interview the risk owner.
Answers
D.
Conduct a gap analysis
D.
Conduct a gap analysis
Answers
Suggested answer: D

Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?

A.
Background checks
A.
Background checks
Answers
B.
Awareness training
B.
Awareness training
Answers
C.
User access
C.
User access
Answers
D.
Policy management
D.
Policy management
Answers
Suggested answer: C

Which of the following statements BEST describes risk appetite?

A.
The amount of risk an organization is willing to accept
A.
The amount of risk an organization is willing to accept
Answers
B.
The effective management of risk and internal control environments
B.
The effective management of risk and internal control environments
Answers
C.
Acceptable variation between risk thresholds and business objectives
C.
Acceptable variation between risk thresholds and business objectives
Answers
D.
The acceptable variation relative to the achievement of objectives
D.
The acceptable variation relative to the achievement of objectives
Answers
Suggested answer: A

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

A.
Classification of the data
A.
Classification of the data
Answers
B.
Type of device
B.
Type of device
Answers
C.
Remote management capabilities
C.
Remote management capabilities
Answers
D.
Volume of data
D.
Volume of data
Answers
Suggested answer: A

An organization has four different projects competing for funding to reduce overall IT risk. Which project should management defer?

A.
Project Charlie
A.
Project Charlie
Answers
B.
Project Bravo
B.
Project Bravo
Answers
C.
Project Alpha
C.
Project Alpha
Answers
D.
Project Delta
D.
Project Delta
Answers
Suggested answer: A

What can be determined from the risk scenario chart?

A.
Relative positions on the risk map
A.
Relative positions on the risk map
Answers
B.
Risk treatment options
B.
Risk treatment options
Answers
C.
Capability of enterprise to implement
C.
Capability of enterprise to implement
Answers
D.
The multiple risk factors addressed by a chosen response
D.
The multiple risk factors addressed by a chosen response
Answers
Suggested answer: A

As part of an overall IT risk management plan, an IT risk register BEST helps management:

A.
align IT processes with business objectives.
A.
align IT processes with business objectives.
Answers
B.
communicate the enterprise risk management policy.
B.
communicate the enterprise risk management policy.
Answers
C.
stay current with existing control status.
C.
stay current with existing control status.
Answers
D.
understand the organizational risk profile.
D.
understand the organizational risk profile.
Answers
Suggested answer: D

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

A.
risk mitigation approach
A.
risk mitigation approach
Answers
B.
cost-benefit analysis.
B.
cost-benefit analysis.
Answers
C.
risk assessment results.
C.
risk assessment results.
Answers
D.
vulnerability assessment results
D.
vulnerability assessment results
Answers
Suggested answer: C

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.
Risk likelihood
A.
Risk likelihood
Answers
B.
Inherent risk
B.
Inherent risk
Answers
C.
Risk appetite
C.
Risk appetite
Answers
D.
Risk tolerance
D.
Risk tolerance
Answers
Suggested answer: B

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

A.
risk appetite.
A.
risk appetite.
Answers
B.
security policies
B.
security policies
Answers
C.
process maps.
C.
process maps.
Answers
D.
risk tolerance level
D.
risk tolerance level
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120