ExamGecko
Home / Isaca / CRISC / List of questions
Ask Question

Isaca CRISC Practice Test - Questions Answers, Page 58

Add to Whishlist

List of questions

Question 571

Report Export Collapse

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?

Become a Premium Member for full access
  Unlock Premium Member

Question 572

Report Export Collapse

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

Become a Premium Member for full access
  Unlock Premium Member

Question 573

Report Export Collapse

Which of the following is the BEST course of action to help reduce the probability of an incident recurring?

Become a Premium Member for full access
  Unlock Premium Member

Question 574

Report Export Collapse

Which of the following is MOST important to the integrity of a security log?

Become a Premium Member for full access
  Unlock Premium Member

Question 575

Report Export Collapse

Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?

Become a Premium Member for full access
  Unlock Premium Member

Question 576

Report Export Collapse

An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?

Become a Premium Member for full access
  Unlock Premium Member

Question 577

Report Export Collapse

A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:

Become a Premium Member for full access
  Unlock Premium Member

Question 578

Report Export Collapse

Which of the following should be done FIRST when developing a data protection management plan?

Become a Premium Member for full access
  Unlock Premium Member

Question 579

Report Export Collapse

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

Become a Premium Member for full access
  Unlock Premium Member

Question 580

Report Export Collapse

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.573 questions
Go to page: of 158
Search

Related questions