Isaca CRISC Practice Test - Questions Answers, Page 68
List of questions
Related questions
After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:
Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?
When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?
Which of the following provides the MOST useful information to determine risk exposure following control implementations?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Which of the following scenarios represents a threat?
Which of the following is MOST helpful in aligning IT risk with business objectives?
A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
Question