Isaca CRISC Practice Test - Questions Answers, Page 55
List of questions
Related questions
Which of the following should be done FIRST when information is no longer required to support business objectives?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Which of the following BEST indicates whether security awareness training is effective?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:
Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner's BEST recommendation to address this situation?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?
Which of the following is the GREATEST advantage of implementing a risk management program?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:
Question