ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 37

Question list
Search
Search

Related questions











Which of the following will BEST support management repotting on risk?

A.
Risk policy requirements
A.
Risk policy requirements
Answers
B.
A risk register
B.
A risk register
Answers
C.
Control self-assessment
C.
Control self-assessment
Answers
D.
Key performance Indicators
D.
Key performance Indicators
Answers
Suggested answer: B

Which of the following is the MOST effective way to mitigate identified risk scenarios?

A.
Assign ownership of the risk response plan
A.
Assign ownership of the risk response plan
Answers
B.
Provide awareness in early detection of risk.
B.
Provide awareness in early detection of risk.
Answers
C.
Perform periodic audits on identified risk.
C.
Perform periodic audits on identified risk.
Answers
D.
areas Document the risk tolerance of the organization.
D.
areas Document the risk tolerance of the organization.
Answers
Suggested answer: A

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

A.
A recommendation for internal audit validation
A.
A recommendation for internal audit validation
Answers
B.
Plans for mitigating the associated risk
B.
Plans for mitigating the associated risk
Answers
C.
Suggestions for improving risk awareness training
C.
Suggestions for improving risk awareness training
Answers
D.
The impact to the organization's risk profile
D.
The impact to the organization's risk profile
Answers
Suggested answer: D

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

A.
Methods of attack progression
A.
Methods of attack progression
Answers
B.
Losses incurred by industry peers
B.
Losses incurred by industry peers
Answers
C.
Most recent antivirus scan reports
C.
Most recent antivirus scan reports
Answers
D.
Potential impact of events
D.
Potential impact of events
Answers
Suggested answer: D

Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?

A.
Configuration updates do not follow formal change control.
A.
Configuration updates do not follow formal change control.
Answers
B.
Operational staff perform control self-assessments.
B.
Operational staff perform control self-assessments.
Answers
C.
Controls are selected without a formal cost-benefit
C.
Controls are selected without a formal cost-benefit
Answers
D.
analysis-Management reviews security policies once every two years.
D.
analysis-Management reviews security policies once every two years.
Answers
Suggested answer: A

Which of the following BEST supports the communication of risk assessment results to stakeholders?

A.
Monitoring of high-risk areas
A.
Monitoring of high-risk areas
Answers
B.
Classification of risk profiles
B.
Classification of risk profiles
Answers
C.
Periodic review of the risk register
C.
Periodic review of the risk register
Answers
D.
Assignment of risk ownership
D.
Assignment of risk ownership
Answers
Suggested answer: D

Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?

A.
Objectives are confirmed with the business owner.
A.
Objectives are confirmed with the business owner.
Answers
B.
Control owners approve control changes.
B.
Control owners approve control changes.
Answers
C.
End-user acceptance testing has been conducted.
C.
End-user acceptance testing has been conducted.
Answers
D.
Performance information in the log is encrypted.
D.
Performance information in the log is encrypted.
Answers
Suggested answer: B

Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?

A.
Total cost of ownership
A.
Total cost of ownership
Answers
B.
Resource dependency analysis
B.
Resource dependency analysis
Answers
C.
Cost-benefit analysis
C.
Cost-benefit analysis
Answers
D.
Business impact analysis
D.
Business impact analysis
Answers
Suggested answer: C

The PRIMARY purpose of a maturity model is to compare the:

A.
current state of key processes to their desired state.
A.
current state of key processes to their desired state.
Answers
B.
actual KPIs with target KPIs.
B.
actual KPIs with target KPIs.
Answers
C.
organization to industry best practices.
C.
organization to industry best practices.
Answers
D.
organization to peers.
D.
organization to peers.
Answers
Suggested answer: A

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

A.
To support regulatory requirements
A.
To support regulatory requirements
Answers
B.
To prevent the risk scenario in the current environment
B.
To prevent the risk scenario in the current environment
Answers
C.
To monitor for potential changes to the risk scenario
C.
To monitor for potential changes to the risk scenario
Answers
D.
To track historical risk assessment results
D.
To track historical risk assessment results
Answers
Suggested answer: C
Total 1.200 questions
Go to page: of 120