Isaca CRISC Practice Test - Questions Answers, Page 54
List of questions
Question 531
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
Question 532
A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?
Question 533
Within the three lines of defense model, the accountability for the system of internal control resides with:
Question 534
Which of the following should be the PRIMARY recipient of reports showing the progress of a current IT risk mitigation project?
Question 535
Which of these documents is MOST important to request from a cloud service provider during a vendor risk assessment?
Question 536
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
Question 537
An organization is considering adopting artificial intelligence (AI). Which of the following is the risk practitioner's MOST important course of action?
Question 538
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
Question 539
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
Question 540
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Question