ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 66

Question list
Search
Search

Related questions











Which of the following BEST indicates the condition of a risk management program?

A.
Number of risk register entries
A.
Number of risk register entries
Answers
B.
Number of controls
B.
Number of controls
Answers
C.
Level of financial support
C.
Level of financial support
Answers
D.
Amount of residual risk
D.
Amount of residual risk
Answers
Suggested answer: D

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

A.
Organizational reporting process
A.
Organizational reporting process
Answers
B.
Incident reporting procedures
B.
Incident reporting procedures
Answers
C.
Regularly scheduled audits
C.
Regularly scheduled audits
Answers
D.
Incident management policy
D.
Incident management policy
Answers
Suggested answer: A

Which of the following is MOST important when developing risk scenarios?

A.
Reviewing business impact analysis (BIA)
A.
Reviewing business impact analysis (BIA)
Answers
B.
Collaborating with IT audit
B.
Collaborating with IT audit
Answers
C.
Conducting vulnerability assessments
C.
Conducting vulnerability assessments
Answers
D.
Obtaining input from key stakeholders
D.
Obtaining input from key stakeholders
Answers
Suggested answer: D

Which of the following approaches will BEST help to ensure the effectiveness of risk awareness training?

A.
Piloting courses with focus groups
A.
Piloting courses with focus groups
Answers
B.
Using reputable third-party training programs
B.
Using reputable third-party training programs
Answers
C.
Reviewing content with senior management
C.
Reviewing content with senior management
Answers
D.
Creating modules for targeted audiences
D.
Creating modules for targeted audiences
Answers
Suggested answer: D

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

A.
Sustained financial loss
A.
Sustained financial loss
Answers
B.
Cost of remediation efforts
B.
Cost of remediation efforts
Answers
C.
Duration of service outage
C.
Duration of service outage
Answers
D.
Average time to recovery
D.
Average time to recovery
Answers
Suggested answer: A

The MOST important objective of information security controls is to:

A.
Identify threats and vulnerability
A.
Identify threats and vulnerability
Answers
B.
Ensure alignment with industry standards
B.
Ensure alignment with industry standards
Answers
C.
Provide measurable risk reduction
C.
Provide measurable risk reduction
Answers
D.
Enforce strong security solutions
D.
Enforce strong security solutions
Answers
Suggested answer: C

Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?

A.
Digital signature
A.
Digital signature
Answers
B.
Edit checks
B.
Edit checks
Answers
C.
Encryption
C.
Encryption
Answers
D.
Multifactor authentication
D.
Multifactor authentication
Answers
Suggested answer: A

The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:

A.
inconsistencies between security policies and procedures
A.
inconsistencies between security policies and procedures
Answers
B.
possible noncompliant activities that lead to data disclosure
B.
possible noncompliant activities that lead to data disclosure
Answers
C.
leading or lagging key risk indicators (KRIs)
C.
leading or lagging key risk indicators (KRIs)
Answers
D.
unknown threats to undermine existing access controls
D.
unknown threats to undermine existing access controls
Answers
Suggested answer: B

Which of the following is the PRIMARY role of a data custodian in the risk management process?

A.
Performing periodic data reviews according to policy
A.
Performing periodic data reviews according to policy
Answers
B.
Reporting and escalating data breaches to senior management
B.
Reporting and escalating data breaches to senior management
Answers
C.
Being accountable for control design
C.
Being accountable for control design
Answers
D.
Ensuring data is protected according to the classification
D.
Ensuring data is protected according to the classification
Answers
Suggested answer: D

An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:

A.
data aggregation
A.
data aggregation
Answers
B.
data privacy
B.
data privacy
Answers
C.
data quality
C.
data quality
Answers
D.
data validation
D.
data validation
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120