ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 46

Question list
Search
Search

List of questions

Search

Related questions











An organization has decided to outsource a web application, and customer data will be stored in the vendor's public cloud. To protect customer data, it is MOST important to ensure which of the following?

A.
The organization's incident response procedures have been updated.
A.
The organization's incident response procedures have been updated.
Answers
B.
The vendor stores the data in the same jurisdiction.
B.
The vendor stores the data in the same jurisdiction.
Answers
C.
Administrative access is only held by the vendor.
C.
Administrative access is only held by the vendor.
Answers
D.
The vendor's responsibilities are defined in the contract.
D.
The vendor's responsibilities are defined in the contract.
Answers
Suggested answer: D

Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?

A.
Update the risk register.
A.
Update the risk register.
Answers
B.
Assign responsibility and accountability for the incident.
B.
Assign responsibility and accountability for the incident.
Answers
C.
Prepare a report for senior management.
C.
Prepare a report for senior management.
Answers
D.
Avoid recurrence of the incident.
D.
Avoid recurrence of the incident.
Answers
Suggested answer: D

Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?

A.
Cyber insurance
A.
Cyber insurance
Answers
B.
Data backups
B.
Data backups
Answers
C.
Incident response plan
C.
Incident response plan
Answers
D.
Key risk indicators (KRIs)
D.
Key risk indicators (KRIs)
Answers
Suggested answer: D

IT disaster recovery point objectives (RPOs) should be based on the:

A.
maximum tolerable downtime.
A.
maximum tolerable downtime.
Answers
B.
maximum tolerable loss of data.
B.
maximum tolerable loss of data.
Answers
C.
need of each business unit.
C.
need of each business unit.
Answers
D.
type of business.
D.
type of business.
Answers
Suggested answer: C

An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:

A.
rolled back changes below management's thresholds.
A.
rolled back changes below management's thresholds.
Answers
B.
change-related exceptions per month.
B.
change-related exceptions per month.
Answers
C.
the average implementation time for changes.
C.
the average implementation time for changes.
Answers
D.
number of user stories approved for implementation.
D.
number of user stories approved for implementation.
Answers
Suggested answer: B

A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?

A.
Update the KRI threshold.
A.
Update the KRI threshold.
Answers
B.
Recommend additional controls.
B.
Recommend additional controls.
Answers
C.
Review incident handling procedures.
C.
Review incident handling procedures.
Answers
D.
Perform a root cause analysis.
D.
Perform a root cause analysis.
Answers
Suggested answer: D

Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?

A.
The business case for the use of loT
A.
The business case for the use of loT
Answers
B.
The loT threat landscape
B.
The loT threat landscape
Answers
C.
Policy development for loT
C.
Policy development for loT
Answers
D.
The network that loT devices can access
D.
The network that loT devices can access
Answers
Suggested answer: B

Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?

A.
Loss expectancy information
A.
Loss expectancy information
Answers
B.
Control performance predictions
B.
Control performance predictions
Answers
C.
IT service level agreements (SLAs)
C.
IT service level agreements (SLAs)
Answers
D.
Remediation activity progress
D.
Remediation activity progress
Answers
Suggested answer: A

Read' rights to application files in a controlled server environment should be approved by the:

A.
business process owner.
A.
business process owner.
Answers
B.
database administrator.
B.
database administrator.
Answers
C.
chief information officer.
C.
chief information officer.
Answers
D.
systems administrator.
D.
systems administrator.
Answers
Suggested answer: A

Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?

A.
To allocate budget for resolution of risk issues
A.
To allocate budget for resolution of risk issues
Answers
B.
To determine if new risk scenarios have been identified
B.
To determine if new risk scenarios have been identified
Answers
C.
To ensure the project timeline is on target
C.
To ensure the project timeline is on target
Answers
D.
To track the status of risk mitigation actions
D.
To track the status of risk mitigation actions
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120