ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 69

Question list
Search
Search

Related questions











Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?

A.
Ensuring that database changes are correctly applied
A.
Ensuring that database changes are correctly applied
Answers
B.
Enforcing that changes are authorized
B.
Enforcing that changes are authorized
Answers
C.
Deterring illicit actions of database administrators
C.
Deterring illicit actions of database administrators
Answers
D.
Preventing system developers from accessing production data
D.
Preventing system developers from accessing production data
Answers
Suggested answer: C

Which of the following will BEST support management reporting on risk?

A.
Control self-assessment (CSA)
A.
Control self-assessment (CSA)
Answers
B.
Risk policy requirements
B.
Risk policy requirements
Answers
C.
A risk register
C.
A risk register
Answers
D.
Key performance indicators (KPIs)
D.
Key performance indicators (KPIs)
Answers
Suggested answer: C

Which of The following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?

A.
Perform a post-implementation review.
A.
Perform a post-implementation review.
Answers
B.
Conduct user acceptance testing.
B.
Conduct user acceptance testing.
Answers
C.
Review the key performance indicators (KPIs).
C.
Review the key performance indicators (KPIs).
Answers
D.
Interview process owners.
D.
Interview process owners.
Answers
Suggested answer: C

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

A.
Conduct social engineering testing.
A.
Conduct social engineering testing.
Answers
B.
Audit security awareness training materials.
B.
Audit security awareness training materials.
Answers
C.
Administer an end-of-training quiz.
C.
Administer an end-of-training quiz.
Answers
D.
Perform a vulnerability assessment.
D.
Perform a vulnerability assessment.
Answers
Suggested answer: A

Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?

A.
Manage cyber risk according to the organization's risk management framework.
A.
Manage cyber risk according to the organization's risk management framework.
Answers
B.
Define cyber roles and responsibilities across the organization
B.
Define cyber roles and responsibilities across the organization
Answers
C.
Conduct cyber risk awareness training tailored specifically for senior management
C.
Conduct cyber risk awareness training tailored specifically for senior management
Answers
D.
Implement a cyber risk program based on industry best practices
D.
Implement a cyber risk program based on industry best practices
Answers
Suggested answer: B

An organization has detected unauthorized logins to its client database servers. Which of the following should be of GREATEST concern?

A.
Potential increase in regulatory scrutiny
A.
Potential increase in regulatory scrutiny
Answers
B.
Potential system downtime
B.
Potential system downtime
Answers
C.
Potential theft of personal information
C.
Potential theft of personal information
Answers
D.
Potential legal risk
D.
Potential legal risk
Answers
Suggested answer: C

Which of the following BEST assists in justifying an investment in automated controls?

A.
Cost-benefit analysis
A.
Cost-benefit analysis
Answers
B.
Alignment of investment with risk appetite
B.
Alignment of investment with risk appetite
Answers
C.
Elimination of compensating controls
C.
Elimination of compensating controls
Answers
D.
Reduction in personnel costs
D.
Reduction in personnel costs
Answers
Suggested answer: A

The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:

A.
resources to monitor backups
A.
resources to monitor backups
Answers
B.
restoration monitoring reports
B.
restoration monitoring reports
Answers
C.
backup recovery requests
C.
backup recovery requests
Answers
D.
recurring restore failures
D.
recurring restore failures
Answers
Suggested answer: D

The risk associated with an asset after controls are applied can be expressed as:

A.
a function of the cost and effectiveness of controls.
A.
a function of the cost and effectiveness of controls.
Answers
B.
the likelihood of a given threat.
B.
the likelihood of a given threat.
Answers
C.
a function of the likelihood and impact.
C.
a function of the likelihood and impact.
Answers
D.
the magnitude of an impact.
D.
the magnitude of an impact.
Answers
Suggested answer: C

Who should be PRIMARILY responsible for establishing an organization's IT risk culture?

A.
Business process owner
A.
Business process owner
Answers
B.
Executive management
B.
Executive management
Answers
C.
Risk management
C.
Risk management
Answers
D.
IT management
D.
IT management
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120