Isaca CRISC Practice Test - Questions Answers, Page 6
List of questions
Question 51
Which of the following would BEST help to ensure that suspicious network activity is identified?
Question 52
Which of the following would BEST help minimize the risk associated with social engineering threats?
Question 53
Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
Question 54
Risk mitigation procedures should include:
Question 55
Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?
Question 56
Improvements in the design and implementation of a control will MOST likely result in an update to:
Question 57
A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?
Question 58
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
Question 59
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Question 60
Which of the following would BEST provide early warning of a high-risk condition?
Question