ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 71

Question list
Search
Search

List of questions

Search

Related questions











A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization's enterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?

A.
Align applications to business processes.
A.
Align applications to business processes.
Answers
B.
Implement an enterprise architecture (EA).
B.
Implement an enterprise architecture (EA).
Answers
C.
Define the software development life cycle (SDLC).
C.
Define the software development life cycle (SDLC).
Answers
D.
Define enterprise-wide system procurement requirements.
D.
Define enterprise-wide system procurement requirements.
Answers
Suggested answer: B

Which of the following provides the MOST useful information when developing a risk profile for management approval?

A.
Residual risk and risk appetite
A.
Residual risk and risk appetite
Answers
B.
Strength of detective and preventative controls
B.
Strength of detective and preventative controls
Answers
C.
Effectiveness and efficiency of controls
C.
Effectiveness and efficiency of controls
Answers
D.
Inherent risk and risk tolerance
D.
Inherent risk and risk tolerance
Answers
Suggested answer: A

Which of the following approaches would BEST help to identify relevant risk scenarios?

A.
Engage line management in risk assessment workshops.
A.
Engage line management in risk assessment workshops.
Answers
B.
Escalate the situation to risk leadership.
B.
Escalate the situation to risk leadership.
Answers
C.
Engage internal audit for risk assessment workshops.
C.
Engage internal audit for risk assessment workshops.
Answers
D.
Review system and process documentation.
D.
Review system and process documentation.
Answers
Suggested answer: A

Which of the following BEST indicates the effectiveness of anti-malware software?

A.
Number of staff hours lost due to malware attacks
A.
Number of staff hours lost due to malware attacks
Answers
B.
Number of downtime hours in business critical servers
B.
Number of downtime hours in business critical servers
Answers
C.
Number of patches made to anti-malware software
C.
Number of patches made to anti-malware software
Answers
D.
Number of successful attacks by malicious software
D.
Number of successful attacks by malicious software
Answers
Suggested answer: D

To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?

A.
Enforce segregation of duties.
A.
Enforce segregation of duties.
Answers
B.
Disclose potential conflicts of interest.
B.
Disclose potential conflicts of interest.
Answers
C.
Delegate responsibilities involving the acquaintance.
C.
Delegate responsibilities involving the acquaintance.
Answers
D.
Notify the subsidiary's legal team.
D.
Notify the subsidiary's legal team.
Answers
Suggested answer: B

Vulnerabilities have been detected on an organization's systems. Applications installed on these systems will not operate if the underlying servers are updated. Which of the following is the risk practitioner's BEST course of action?

A.
Recommend the business change the application.
A.
Recommend the business change the application.
Answers
B.
Recommend a risk treatment plan.
B.
Recommend a risk treatment plan.
Answers
C.
Include the risk in the next quarterly update to management.
C.
Include the risk in the next quarterly update to management.
Answers
D.
Implement compensating controls.
D.
Implement compensating controls.
Answers
Suggested answer: D

Which of the following should be management's PRIMARY consideration when approving risk response action plans?

A.
Ability of the action plans to address multiple risk scenarios
A.
Ability of the action plans to address multiple risk scenarios
Answers
B.
Ease of implementing the risk treatment solution
B.
Ease of implementing the risk treatment solution
Answers
C.
Changes in residual risk after implementing the plans
C.
Changes in residual risk after implementing the plans
Answers
D.
Prioritization for implementing the action plans
D.
Prioritization for implementing the action plans
Answers
Suggested answer: C

Which of the following is the MOST common concern associated with outsourcing to a service provider?

A.
Lack of technical expertise
A.
Lack of technical expertise
Answers
B.
Combining incompatible duties
B.
Combining incompatible duties
Answers
C.
Unauthorized data usage
C.
Unauthorized data usage
Answers
D.
Denial of service attacks
D.
Denial of service attacks
Answers
Suggested answer: C

Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?

A.
Customer database manager
A.
Customer database manager
Answers
B.
Customer data custodian
B.
Customer data custodian
Answers
C.
Data privacy officer
C.
Data privacy officer
Answers
D.
Audit committee
D.
Audit committee
Answers
Suggested answer: B

When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?

A.
Risk management
A.
Risk management
Answers
B.
Change management
B.
Change management
Answers
C.
Problem management
C.
Problem management
Answers
D.
Quality management
D.
Quality management
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120