ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 6

Question list
Search
Search

Related questions











Which of the following would BEST help to ensure that suspicious network activity is identified?

A.
Analyzing intrusion detection system (IDS) logs
A.
Analyzing intrusion detection system (IDS) logs
Answers
B.
Analyzing server logs
B.
Analyzing server logs
Answers
C.
Using a third-party monitoring provider
C.
Using a third-party monitoring provider
Answers
D.
Coordinating events with appropriate agencies
D.
Coordinating events with appropriate agencies
Answers
Suggested answer: A

Which of the following would BEST help minimize the risk associated with social engineering threats?

A.
Enforcing employees sanctions
A.
Enforcing employees sanctions
Answers
B.
Conducting phishing exercises
B.
Conducting phishing exercises
Answers
C.
Enforcing segregation of dunes
C.
Enforcing segregation of dunes
Answers
D.
Reviewing the organization's risk appetite
D.
Reviewing the organization's risk appetite
Answers
Suggested answer: B

Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?

A.
Ensuring availability of resources for log analysis
A.
Ensuring availability of resources for log analysis
Answers
B.
Implementing log analysis tools to automate controls
B.
Implementing log analysis tools to automate controls
Answers
C.
Ensuring the control is proportional to the risk
C.
Ensuring the control is proportional to the risk
Answers
D.
Building correlations between logs collected from different sources
D.
Building correlations between logs collected from different sources
Answers
Suggested answer: C

Risk mitigation procedures should include:

A.
buying an insurance policy.
A.
buying an insurance policy.
Answers
B.
acceptance of exposures
B.
acceptance of exposures
Answers
C.
deployment of counter measures.
C.
deployment of counter measures.
Answers
D.
enterprise architecture implementation.
D.
enterprise architecture implementation.
Answers
Suggested answer: B

Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?

A.
A control self-assessment
A.
A control self-assessment
Answers
B.
A third-party security assessment report
B.
A third-party security assessment report
Answers
C.
Internal audit reports from the vendor
C.
Internal audit reports from the vendor
Answers
D.
Service level agreement monitoring
D.
Service level agreement monitoring
Answers
Suggested answer: B

Improvements in the design and implementation of a control will MOST likely result in an update to:

A.
inherent risk.
A.
inherent risk.
Answers
B.
residual risk.
B.
residual risk.
Answers
C.
risk appetite
C.
risk appetite
Answers
D.
risk tolerance
D.
risk tolerance
Answers
Suggested answer: B

A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?

A.
Document the finding in the risk register.
A.
Document the finding in the risk register.
Answers
B.
Invoke the incident response plan.
B.
Invoke the incident response plan.
Answers
C.
Re-evaluate key risk indicators.
C.
Re-evaluate key risk indicators.
Answers
D.
Modify the design of the control.
D.
Modify the design of the control.
Answers
Suggested answer: A

Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?

A.
Identification of controls gaps that may lead to noncompliance
A.
Identification of controls gaps that may lead to noncompliance
Answers
B.
Prioritization of risk action plans across departments
B.
Prioritization of risk action plans across departments
Answers
C.
Early detection of emerging threats
C.
Early detection of emerging threats
Answers
D.
Accurate measurement of loss impact
D.
Accurate measurement of loss impact
Answers
Suggested answer: D

Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?

A.
Sensitivity analysis
A.
Sensitivity analysis
Answers
B.
Level of residual risk
B.
Level of residual risk
Answers
C.
Cost-benefit analysis
C.
Cost-benefit analysis
Answers
D.
Risk appetite
D.
Risk appetite
Answers
Suggested answer: C

Which of the following would BEST provide early warning of a high-risk condition?

A.
Risk register
A.
Risk register
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Key risk indicator (KRI)
C.
Key risk indicator (KRI)
Answers
D.
Key performance indicator (KPI)
D.
Key performance indicator (KPI)
Answers
Suggested answer: C
Total 1.200 questions
Go to page: of 120