ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 5

Question list
Search
Search

List of questions

Search

Related questions











What is the BEST information to present to business control owners when justifying costs related to controls?

A.
Loss event frequency and magnitude
A.
Loss event frequency and magnitude
Answers
B.
The previous year's budget and actuals
B.
The previous year's budget and actuals
Answers
C.
Industry benchmarks and standards
C.
Industry benchmarks and standards
Answers
D.
Return on IT security-related investments
D.
Return on IT security-related investments
Answers
Suggested answer: D

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

A.
Key risk indicators (KRls)
A.
Key risk indicators (KRls)
Answers
B.
Inherent risk
B.
Inherent risk
Answers
C.
Residual risk
C.
Residual risk
Answers
D.
Risk appetite
D.
Risk appetite
Answers
Suggested answer: C

A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?

A.
Risk impact
A.
Risk impact
Answers
B.
Risk trend
B.
Risk trend
Answers
C.
Risk appetite
C.
Risk appetite
Answers
D.
Risk likelihood
D.
Risk likelihood
Answers
Suggested answer: A

Which of the following is the MOST important benefit of key risk indicators (KRIs)'

A.
Assisting in continually optimizing risk governance
A.
Assisting in continually optimizing risk governance
Answers
B.
Enabling the documentation and analysis of trends
B.
Enabling the documentation and analysis of trends
Answers
C.
Ensuring compliance with regulatory requirements
C.
Ensuring compliance with regulatory requirements
Answers
D.
Providing an early warning to take proactive actions
D.
Providing an early warning to take proactive actions
Answers
Suggested answer: D

IT risk assessments can BEST be used by management:

A.
for compliance with laws and regulations
A.
for compliance with laws and regulations
Answers
B.
as a basis for cost-benefit analysis.
B.
as a basis for cost-benefit analysis.
Answers
C.
as input foe decision-making
C.
as input foe decision-making
Answers
D.
to measure organizational success.
D.
to measure organizational success.
Answers
Suggested answer: C

A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?

A.
Business continuity director
A.
Business continuity director
Answers
B.
Disaster recovery manager
B.
Disaster recovery manager
Answers
C.
Business application owner
C.
Business application owner
Answers
D.
Data center manager
D.
Data center manager
Answers
Suggested answer: C

Which of the following will BEST quantify the risk associated with malicious users in an organization?

A.
Business impact analysis
A.
Business impact analysis
Answers
B.
Risk analysis
B.
Risk analysis
Answers
C.
Threat risk assessment
C.
Threat risk assessment
Answers
D.
Vulnerability assessment
D.
Vulnerability assessment
Answers
Suggested answer: A

Which of the following is the MOST important element of a successful risk awareness training program?

A.
Customizing content for the audience
A.
Customizing content for the audience
Answers
B.
Providing incentives to participants
B.
Providing incentives to participants
Answers
C.
Mapping to a recognized standard
C.
Mapping to a recognized standard
Answers
D.
Providing metrics for measurement
D.
Providing metrics for measurement
Answers
Suggested answer: A

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

A.
requirements of management.
A.
requirements of management.
Answers
B.
specific risk analysis framework being used.
B.
specific risk analysis framework being used.
Answers
C.
organizational risk tolerance
C.
organizational risk tolerance
Answers
D.
results of the risk assessment.
D.
results of the risk assessment.
Answers
Suggested answer: A

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

A.
chief risk officer.
A.
chief risk officer.
Answers
B.
project manager.
B.
project manager.
Answers
C.
chief information officer.
C.
chief information officer.
Answers
D.
business process owner.
D.
business process owner.
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120