Isaca CRISC Practice Test - Questions Answers, Page 43
Related questions
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?
Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?
Which of the following is MOST influential when management makes risk response decisions?
The risk appetite for an organization could be derived from which of the following?
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
Which of the following BEST reduces the probability of laptop theft?
Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?
The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Question