Isaca CRISC Practice Test - Questions Answers, Page 54

List of questions
Question 531

What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
Question 532

A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?
Question 533

Within the three lines of defense model, the accountability for the system of internal control resides with:
Question 534

Which of the following should be the PRIMARY recipient of reports showing the progress of a current IT risk mitigation project?
Question 535

Which of these documents is MOST important to request from a cloud service provider during a vendor risk assessment?
Question 536

Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
Question 537

An organization is considering adopting artificial intelligence (AI). Which of the following is the risk practitioner's MOST important course of action?
Question 538

Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
Question 539

An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
Question 540

A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Question