Isaca CRISC Practice Test - Questions Answers, Page 4
List of questions
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
Which of the following is MOST critical when designing controls?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Which of the following is the MOST important outcome of reviewing the risk management process?
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
Which of the following is the BEST method to identify unnecessary controls?
Question