Isaca CRISC Practice Test - Questions Answers, Page 58
List of questions
Related questions
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Which of the following is MOST important to the integrity of a security log?
Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:
Which of the following should be done FIRST when developing a data protection management plan?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Question