Isaca CRISC Practice Test - Questions Answers, Page 46
List of questions
Related questions
An organization has decided to outsource a web application, and customer data will be stored in the vendor's public cloud. To protect customer data, it is MOST important to ensure which of the following?
Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
IT disaster recovery point objectives (RPOs) should be based on the:
An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
Read' rights to application files in a controlled server environment should be approved by the:
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Question