ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 52

Question list
Search
Search

List of questions

Search

Related questions











The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?

A.
The risk impact changes.
A.
The risk impact changes.
Answers
B.
The risk classification changes.
B.
The risk classification changes.
Answers
C.
The inherent risk changes.
C.
The inherent risk changes.
Answers
D.
The residual risk changes.
D.
The residual risk changes.
Answers
Suggested answer: D

Which of the following is MOST important to sustainable development of secure IT services?

A.
Security training for systems development staff
A.
Security training for systems development staff
Answers
B.
\Well-documented business cases
B.
\Well-documented business cases
Answers
C.
Security architecture principles
C.
Security architecture principles
Answers
D.
Secure coding practices
D.
Secure coding practices
Answers
Suggested answer: C

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

A.
Third-party data custodian
A.
Third-party data custodian
Answers
B.
Data custodian
B.
Data custodian
Answers
C.
Regional office executive
C.
Regional office executive
Answers
D.
Data owner
D.
Data owner
Answers
Suggested answer: D

An organization is making significant changes to an application. At what point should the application risk profile be updated?

A.
After user acceptance testing (UAT)
A.
After user acceptance testing (UAT)
Answers
B.
Upon release to production
B.
Upon release to production
Answers
C.
During backlog scheduling
C.
During backlog scheduling
Answers
D.
When reviewing functional requirements
D.
When reviewing functional requirements
Answers
Suggested answer: D

Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?

A.
Organizational strategy
A.
Organizational strategy
Answers
B.
Cost-benefit analysis
B.
Cost-benefit analysis
Answers
C.
Control self-assessment (CSA)
C.
Control self-assessment (CSA)
Answers
D.
Business requirements
D.
Business requirements
Answers
Suggested answer: A

Which of the following MOST effectively limits the impact of a ransomware attack?

A.
Cyber insurance
A.
Cyber insurance
Answers
B.
Cryptocurrency reserve
B.
Cryptocurrency reserve
Answers
C.
Data backups
C.
Data backups
Answers
D.
End user training
D.
End user training
Answers
Suggested answer: C

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

A.
To deliver projects on time and on budget
A.
To deliver projects on time and on budget
Answers
B.
To assess inherent risk
B.
To assess inherent risk
Answers
C.
To include project risk in the enterprise-wide IT risk profit.
C.
To include project risk in the enterprise-wide IT risk profit.
Answers
D.
To assess risk throughout the project
D.
To assess risk throughout the project
Answers
Suggested answer: B

An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do

FIRST?

A.
Confirm the vulnerabilities with the third party
A.
Confirm the vulnerabilities with the third party
Answers
B.
Identify procedures to mitigate the vulnerabilities.
B.
Identify procedures to mitigate the vulnerabilities.
Answers
C.
Notify information security management.
C.
Notify information security management.
Answers
D.
Request IT to remove the system from the network.
D.
Request IT to remove the system from the network.
Answers
Suggested answer: B

Which of the following is the MOST important component of effective security incident response?

A.
Network time protocol synchronization
A.
Network time protocol synchronization
Answers
B.
Identification of attack sources
B.
Identification of attack sources
Answers
C.
Early detection of breaches
C.
Early detection of breaches
Answers
D.
A documented communications plan
D.
A documented communications plan
Answers
Suggested answer: C

A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?

A.
The audit had a broader scope than the CSA.
A.
The audit had a broader scope than the CSA.
Answers
B.
The CSA was not sample-based.
B.
The CSA was not sample-based.
Answers
C.
The CSA did not test control effectiveness.
C.
The CSA did not test control effectiveness.
Answers
D.
The CSA was compliance-based, while the audit was risk-based.
D.
The CSA was compliance-based, while the audit was risk-based.
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120