Isaca CRISC Practice Test - Questions Answers, Page 58

List of questions
Question 571

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
Question 572

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Question 573

Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Question 574

Which of the following is MOST important to the integrity of a security log?
Question 575

Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
Question 576

An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
Question 577

A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:
Question 578

Which of the following should be done FIRST when developing a data protection management plan?
Question 579

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
Question 580

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Question