Isaca CRISC Practice Test - Questions Answers, Page 54
List of questions
Related questions
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?
Within the three lines of defense model, the accountability for the system of internal control resides with:
Which of the following should be the PRIMARY recipient of reports showing the progress of a current IT risk mitigation project?
Which of these documents is MOST important to request from a cloud service provider during a vendor risk assessment?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
An organization is considering adopting artificial intelligence (AI). Which of the following is the risk practitioner's MOST important course of action?
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Question