ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 60

Question list
Search
Search

Related questions











Which of the following data would be used when performing a business impact analysis (BIA)?

A.
Cost-benefit analysis of running the current business
A.
Cost-benefit analysis of running the current business
Answers
B.
Cost of regulatory compliance
B.
Cost of regulatory compliance
Answers
C.
Projected impact of current business on future business
C.
Projected impact of current business on future business
Answers
D.
Expected costs for recovering the business
D.
Expected costs for recovering the business
Answers
Suggested answer: D

Prudent business practice requires that risk appetite not exceed:

A.
inherent risk.
A.
inherent risk.
Answers
B.
risk tolerance.
B.
risk tolerance.
Answers
C.
risk capacity.
C.
risk capacity.
Answers
D.
residual risk.
D.
residual risk.
Answers
Suggested answer: C

Which of the following MUST be updated to maintain an IT risk register?

A.
Expected frequency and potential impact
A.
Expected frequency and potential impact
Answers
B.
Risk tolerance
B.
Risk tolerance
Answers
C.
Enterprise-wide IT risk assessment
C.
Enterprise-wide IT risk assessment
Answers
D.
Risk appetite
D.
Risk appetite
Answers
Suggested answer: C

Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?

A.
Aligning IT with short-term and long-term goals of the organization
A.
Aligning IT with short-term and long-term goals of the organization
Answers
B.
Ensuring the IT budget and resources focus on risk management
B.
Ensuring the IT budget and resources focus on risk management
Answers
C.
Ensuring senior management's primary focus is on the impact of identified risk
C.
Ensuring senior management's primary focus is on the impact of identified risk
Answers
D.
Prioritizing internal departments that provide service to customers
D.
Prioritizing internal departments that provide service to customers
Answers
Suggested answer: A

An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:

A.
a lack of mitigating actions for identified risk
A.
a lack of mitigating actions for identified risk
Answers
B.
decreased threat levels
B.
decreased threat levels
Answers
C.
ineffective service delivery
C.
ineffective service delivery
Answers
D.
ineffective IT governance
D.
ineffective IT governance
Answers
Suggested answer: D

Which of the following is the BEST reason to use qualitative measures to express residual risk levels related to emerging threats?

A.
Qualitative measures require less ongoing monitoring.
A.
Qualitative measures require less ongoing monitoring.
Answers
B.
Qualitative measures are better aligned to regulatory requirements.
B.
Qualitative measures are better aligned to regulatory requirements.
Answers
C.
Qualitative measures are better able to incorporate expert judgment.
C.
Qualitative measures are better able to incorporate expert judgment.
Answers
D.
Qualitative measures are easier to update.
D.
Qualitative measures are easier to update.
Answers
Suggested answer: C

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

A.
Percentage of business users completing risk training
A.
Percentage of business users completing risk training
Answers
B.
Percentage of high-risk scenarios for which risk action plans have been developed
B.
Percentage of high-risk scenarios for which risk action plans have been developed
Answers
C.
Number of key risk indicators (KRIs) defined
C.
Number of key risk indicators (KRIs) defined
Answers
D.
Time between when IT risk scenarios are identified and the enterprise's response
D.
Time between when IT risk scenarios are identified and the enterprise's response
Answers
Suggested answer: B

A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls. Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?

A.
Identify previous data breaches using the startup company's audit reports.
A.
Identify previous data breaches using the startup company's audit reports.
Answers
B.
Have the data privacy officer review the startup company's data protection policies.
B.
Have the data privacy officer review the startup company's data protection policies.
Answers
C.
Classify and protect the data according to the parent company's internal standards.
C.
Classify and protect the data according to the parent company's internal standards.
Answers
D.
Implement a firewall and isolate the environment from the parent company's network.
D.
Implement a firewall and isolate the environment from the parent company's network.
Answers
Suggested answer: A

Which of the following is the BEST indication of a mature organizational risk culture?

A.
Corporate risk appetite is communicated to staff members.
A.
Corporate risk appetite is communicated to staff members.
Answers
B.
Risk owners understand and accept accountability for risk.
B.
Risk owners understand and accept accountability for risk.
Answers
C.
Risk policy has been published and acknowledged by employees.
C.
Risk policy has been published and acknowledged by employees.
Answers
D.
Management encourages the reporting of policy breaches.
D.
Management encourages the reporting of policy breaches.
Answers
Suggested answer: B

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

A.
Cost of controls
A.
Cost of controls
Answers
B.
Risk tolerance
B.
Risk tolerance
Answers
C.
Risk appetite
C.
Risk appetite
Answers
D.
Probability definition
D.
Probability definition
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120