Isaca CRISC Practice Test - Questions Answers, Page 4

List of questions
Question 31

A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
Question 32

A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
Question 33

A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
Question 34

Which of the following is MOST critical when designing controls?
Question 35

Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Question 36

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
Question 37

Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Question 38

Which of the following is the MOST important outcome of reviewing the risk management process?
Question 39

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
Question 40

Which of the following is the BEST method to identify unnecessary controls?
Question