ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 39

Question list
Search
Search

Related questions











Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?

A.
Providing oversight of risk management processes
A.
Providing oversight of risk management processes
Answers
B.
Implementing processes to detect and deter fraud
B.
Implementing processes to detect and deter fraud
Answers
C.
Ensuring that risk and control assessments consider fraud
C.
Ensuring that risk and control assessments consider fraud
Answers
D.
Monitoring the results of actions taken to mitigate fraud
D.
Monitoring the results of actions taken to mitigate fraud
Answers
Suggested answer: B

Mapping open risk issues to an enterprise risk heat map BEST facilitates:

A.
risk response.
A.
risk response.
Answers
B.
control monitoring.
B.
control monitoring.
Answers
C.
risk identification.
C.
risk identification.
Answers
D.
risk ownership.
D.
risk ownership.
Answers
Suggested answer: A

Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?

A.
Engaging external risk professionals to periodically review the risk
A.
Engaging external risk professionals to periodically review the risk
Answers
B.
Prioritizing global standards over local requirements in the risk profile
B.
Prioritizing global standards over local requirements in the risk profile
Answers
C.
Updating the risk profile with risk assessment results
C.
Updating the risk profile with risk assessment results
Answers
D.
Assigning quantitative values to qualitative metrics in the risk register
D.
Assigning quantitative values to qualitative metrics in the risk register
Answers
Suggested answer: C

Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?

A.
Identify information security controls in the requirements analysis
A.
Identify information security controls in the requirements analysis
Answers
B.
Identify key risk indicators (KRIs) as process output.
B.
Identify key risk indicators (KRIs) as process output.
Answers
C.
Design key performance indicators (KPIs) for security in system specifications.
C.
Design key performance indicators (KPIs) for security in system specifications.
Answers
D.
Include information security control specifications in business cases.
D.
Include information security control specifications in business cases.
Answers
Suggested answer: D

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

A.
avoided.
A.
avoided.
Answers
B.
accepted.
B.
accepted.
Answers
C.
mitigated.
C.
mitigated.
Answers
D.
transferred.
D.
transferred.
Answers
Suggested answer: B

Which of the following is MOST effective in continuous risk management process improvement?

A.
Periodic assessments
A.
Periodic assessments
Answers
B.
Change management
B.
Change management
Answers
C.
Awareness training
C.
Awareness training
Answers
D.
Policy updates
D.
Policy updates
Answers
Suggested answer: A

Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?

A.
A companion of risk assessment results to the desired state
A.
A companion of risk assessment results to the desired state
Answers
B.
A quantitative presentation of risk assessment results
B.
A quantitative presentation of risk assessment results
Answers
C.
An assessment of organizational maturity levels and readiness
C.
An assessment of organizational maturity levels and readiness
Answers
D.
A qualitative presentation of risk assessment results
D.
A qualitative presentation of risk assessment results
Answers
Suggested answer: A

Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?

A.
Detective control
A.
Detective control
Answers
B.
Deterrent control
B.
Deterrent control
Answers
C.
Preventive control
C.
Preventive control
Answers
D.
Corrective control
D.
Corrective control
Answers
Suggested answer: D

What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?

A.
Documenting project lessons learned
A.
Documenting project lessons learned
Answers
B.
Validating the risk mitigation project has been completed
B.
Validating the risk mitigation project has been completed
Answers
C.
Confirming that the project budget was not exceeded
C.
Confirming that the project budget was not exceeded
Answers
D.
Verifying that the risk level has been lowered
D.
Verifying that the risk level has been lowered
Answers
Suggested answer: D

Which of the following is MOST important when discussing risk within an organization?

A.
Adopting a common risk taxonomy
A.
Adopting a common risk taxonomy
Answers
B.
Using key performance indicators (KPIs)
B.
Using key performance indicators (KPIs)
Answers
C.
Creating a risk communication policy
C.
Creating a risk communication policy
Answers
D.
Using key risk indicators (KRIs)
D.
Using key risk indicators (KRIs)
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120