Isaca CRISC Practice Test - Questions Answers, Page 4
List of questions
Question 31
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
Question 32
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
Question 33
A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
Question 34
Which of the following is MOST critical when designing controls?
Question 35
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Question 36
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
Question 37
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Question 38
Which of the following is the MOST important outcome of reviewing the risk management process?
Question 39
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
Question 40
Which of the following is the BEST method to identify unnecessary controls?
Question