ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 44

Question list
Search
Search

Related questions











Which of the following is the MOST important enabler of effective risk management?

A.
User awareness of policies and procedures
A.
User awareness of policies and procedures
Answers
B.
Implementation of proper controls
B.
Implementation of proper controls
Answers
C.
Senior management support
C.
Senior management support
Answers
D.
Continuous monitoring of threats and vulnerabilities
D.
Continuous monitoring of threats and vulnerabilities
Answers
Suggested answer: C

Which of the following is MOST important when defining controls?

A.
Identifying monitoring mechanisms
A.
Identifying monitoring mechanisms
Answers
B.
Including them in the risk register
B.
Including them in the risk register
Answers
C.
Aligning them with business objectives
C.
Aligning them with business objectives
Answers
D.
Prototyping compensating controls
D.
Prototyping compensating controls
Answers
Suggested answer: C

A risk practitioner is reviewing a vendor contract and finds there is no clause to control privileged access to the organization's systems by vendor employees. Which of the following is the risk practitioner's BEST course of action?

A.
Contact the control owner to determine if a gap in controls exists.
A.
Contact the control owner to determine if a gap in controls exists.
Answers
B.
Add this concern to the risk register and highlight it for management review.
B.
Add this concern to the risk register and highlight it for management review.
Answers
C.
Report this concern to the contracts department for further action.
C.
Report this concern to the contracts department for further action.
Answers
D.
Document this concern as a threat and conduct an impact analysis.
D.
Document this concern as a threat and conduct an impact analysis.
Answers
Suggested answer: D

Which of the following is the PRIMARY objective for automating controls?

A.
Improving control process efficiency
A.
Improving control process efficiency
Answers
B.
Facilitating continuous control monitoring
B.
Facilitating continuous control monitoring
Answers
C.
Complying with functional requirements
C.
Complying with functional requirements
Answers
D.
Reducing the need for audit reviews
D.
Reducing the need for audit reviews
Answers
Suggested answer: A

Which of the following is the GREATEST risk associated with the use of data analytics?

A.
Distributed data sources
A.
Distributed data sources
Answers
B.
Manual data extraction
B.
Manual data extraction
Answers
C.
Incorrect data selection
C.
Incorrect data selection
Answers
D.
Excessive data volume
D.
Excessive data volume
Answers
Suggested answer: C

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.
Business resilience manager
A.
Business resilience manager
Answers
B.
Disaster recovery team lead
B.
Disaster recovery team lead
Answers
C.
Application owner
C.
Application owner
Answers
D.
IT operations manager
D.
IT operations manager
Answers
Suggested answer: C

Which of the following is MOST important when developing risk scenarios?

A.
The scenarios are based on industry best practice.
A.
The scenarios are based on industry best practice.
Answers
B.
The scenarios focus on current vulnerabilities.
B.
The scenarios focus on current vulnerabilities.
Answers
C.
The scenarios are relevant to the organization.
C.
The scenarios are relevant to the organization.
Answers
D.
The scenarios include technical consequences.
D.
The scenarios include technical consequences.
Answers
Suggested answer: C

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

A.
identifying risk scenarios.
A.
identifying risk scenarios.
Answers
B.
determining the risk strategy.
B.
determining the risk strategy.
Answers
C.
calculating impact and likelihood.
C.
calculating impact and likelihood.
Answers
D.
completing the controls catalog.
D.
completing the controls catalog.
Answers
Suggested answer: A

Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?

A.
To enhance compliance with standards
A.
To enhance compliance with standards
Answers
B.
To minimize subjectivity of assessments
B.
To minimize subjectivity of assessments
Answers
C.
To increase consensus among peers
C.
To increase consensus among peers
Answers
D.
To provide assessments for benchmarking
D.
To provide assessments for benchmarking
Answers
Suggested answer: B

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

A.
A privacy impact assessment has not been completed.
A.
A privacy impact assessment has not been completed.
Answers
B.
Data encryption methods apply to a subset of Pll obtained.
B.
Data encryption methods apply to a subset of Pll obtained.
Answers
C.
The data privacy officer was not consulted.
C.
The data privacy officer was not consulted.
Answers
D.
Insufficient access controls are used on the loT devices.
D.
Insufficient access controls are used on the loT devices.
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120