ExamGecko
Home / Isaca / CRISC / List of questions
Ask Question

Isaca CRISC Practice Test - Questions Answers, Page 59

Add to Whishlist

List of questions

Question 581

Report Export Collapse

Which of the following methods is an example of risk mitigation?

Become a Premium Member for full access
  Unlock Premium Member

Question 582

Report Export Collapse

A service provider is managing a client's servers. During an audit of the service, a noncompliant control is discovered that will not be resolved before the next audit because the client cannot afford the downtime required to correct the issue. The service provider's MOST appropriate action would be to:

Become a Premium Member for full access
  Unlock Premium Member

Question 583

Report Export Collapse

The PRIMARY purpose of IT control status reporting is to:

Become a Premium Member for full access
  Unlock Premium Member

Question 584

Report Export Collapse

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

Become a Premium Member for full access
  Unlock Premium Member

Question 585

Report Export Collapse

Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?

Become a Premium Member for full access
  Unlock Premium Member

Question 586

Report Export Collapse

Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?

Become a Premium Member for full access
  Unlock Premium Member

Question 587

Report Export Collapse

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

Become a Premium Member for full access
  Unlock Premium Member

Question 588

Report Export Collapse

Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?

Become a Premium Member for full access
  Unlock Premium Member

Question 589

Report Export Collapse

Which of the following should be included in a risk scenario to be used for risk analysis?

Become a Premium Member for full access
  Unlock Premium Member

Question 590

Report Export Collapse

While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?

Become a Premium Member for full access
  Unlock Premium Member
Total 1.573 questions
Go to page: of 158
Search

Related questions