ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 55

Question list
Search
Search

List of questions

Search

Related questions











Which of the following should be done FIRST when information is no longer required to support business objectives?

A.
Archive the information to a backup database.
A.
Archive the information to a backup database.
Answers
B.
Protect the information according to the classification policy.
B.
Protect the information according to the classification policy.
Answers
C.
Assess the information against the retention policy.
C.
Assess the information against the retention policy.
Answers
D.
Securely and permanently erase the information
D.
Securely and permanently erase the information
Answers
Suggested answer: C

When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?

A.
Risk management strategy planning
A.
Risk management strategy planning
Answers
B.
Risk monitoring and control
B.
Risk monitoring and control
Answers
C.
Risk identification
C.
Risk identification
Answers
D.
Risk response planning
D.
Risk response planning
Answers
Suggested answer: C

Which of the following BEST indicates whether security awareness training is effective?

A.
User self-assessment
A.
User self-assessment
Answers
B.
User behavior after training
B.
User behavior after training
Answers
C.
Course evaluation
C.
Course evaluation
Answers
D.
Quality of training materials
D.
Quality of training materials
Answers
Suggested answer: B

An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:

A.
identify key risk indicators (KRls) for ongoing monitoring
A.
identify key risk indicators (KRls) for ongoing monitoring
Answers
B.
validate the CTO's decision with the business process owner
B.
validate the CTO's decision with the business process owner
Answers
C.
update the risk register with the selected risk response
C.
update the risk register with the selected risk response
Answers
D.
recommend that the CTO revisit the risk acceptance decision.
D.
recommend that the CTO revisit the risk acceptance decision.
Answers
Suggested answer: A

Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner's BEST recommendation to address this situation?

A.
Conduct a comprehensive compliance review.
A.
Conduct a comprehensive compliance review.
Answers
B.
Develop incident response procedures for noncompliance.
B.
Develop incident response procedures for noncompliance.
Answers
C.
Investigate the root cause of noncompliance.
C.
Investigate the root cause of noncompliance.
Answers
D.
Declare a security breach and Inform management.
D.
Declare a security breach and Inform management.
Answers
Suggested answer: C

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.
Implement segregation of duties.
A.
Implement segregation of duties.
Answers
B.
Enforce an internal data access policy.
B.
Enforce an internal data access policy.
Answers
C.
Enforce the use of digital signatures.
C.
Enforce the use of digital signatures.
Answers
D.
Apply single sign-on for access control.
D.
Apply single sign-on for access control.
Answers
Suggested answer: B

A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?

A.
Sensitivity of the data
A.
Sensitivity of the data
Answers
B.
Readability of test data
B.
Readability of test data
Answers
C.
Security of the test environment
C.
Security of the test environment
Answers
D.
Availability of data to authorized staff
D.
Availability of data to authorized staff
Answers
Suggested answer: A

Which of the following is the GREATEST advantage of implementing a risk management program?

A.
Enabling risk-aware decisions
A.
Enabling risk-aware decisions
Answers
B.
Promoting a risk-aware culture
B.
Promoting a risk-aware culture
Answers
C.
Improving security governance
C.
Improving security governance
Answers
D.
Reducing residual risk
D.
Reducing residual risk
Answers
Suggested answer: A

When updating the risk register after a risk assessment, which of the following is MOST important to include?

A.
Historical losses due to past risk events
A.
Historical losses due to past risk events
Answers
B.
Cost to reduce the impact and likelihood
B.
Cost to reduce the impact and likelihood
Answers
C.
Likelihood and impact of the risk scenario
C.
Likelihood and impact of the risk scenario
Answers
D.
Actor and threat type of the risk scenario
D.
Actor and threat type of the risk scenario
Answers
Suggested answer: C

The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:

A.
develop a comprehensive risk mitigation strategy
A.
develop a comprehensive risk mitigation strategy
Answers
B.
develop understandable and realistic risk scenarios
B.
develop understandable and realistic risk scenarios
Answers
C.
identify root causes for relevant events
C.
identify root causes for relevant events
Answers
D.
perform an aggregated cost-benefit analysis
D.
perform an aggregated cost-benefit analysis
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120