Isaca CRISC Practice Test - Questions Answers, Page 58
List of questions
Question 571
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
Question 572
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Question 573
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Question 574
Which of the following is MOST important to the integrity of a security log?
Question 575
Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
Question 576
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
Question 577
A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:
Question 578
Which of the following should be done FIRST when developing a data protection management plan?
Question 579
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
Question 580
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Question