Isaca CRISC Practice Test - Questions Answers, Page 6
List of questions
Which of the following would BEST help to ensure that suspicious network activity is identified?
Which of the following would BEST help minimize the risk associated with social engineering threats?
Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
Risk mitigation procedures should include:
Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?
Improvements in the design and implementation of a control will MOST likely result in an update to:
A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Which of the following would BEST provide early warning of a high-risk condition?
Question