ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 73

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would BEST help an enterprise define and communicate its risk appetite?

A.
Gap analysis
A.
Gap analysis
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Heat map
C.
Heat map
Answers
D.
Risk register
D.
Risk register
Answers
Suggested answer: C

An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?

A.
Risk manager
A.
Risk manager
Answers
B.
Data owner
B.
Data owner
Answers
C.
End user
C.
End user
Answers
D.
IT department
D.
IT department
Answers
Suggested answer: D

From a risk management perspective, the PRIMARY objective of using maturity models is to enable:

A.
solution delivery.
A.
solution delivery.
Answers
B.
resource utilization.
B.
resource utilization.
Answers
C.
strategic alignment.
C.
strategic alignment.
Answers
D.
performance evaluation.
D.
performance evaluation.
Answers
Suggested answer: C

During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?

A.
Conduct a comprehensive review of access management processes.
A.
Conduct a comprehensive review of access management processes.
Answers
B.
Declare a security incident and engage the incident response team.
B.
Declare a security incident and engage the incident response team.
Answers
C.
Conduct a comprehensive awareness session for system administrators.
C.
Conduct a comprehensive awareness session for system administrators.
Answers
D.
Evaluate system administrators' technical skills to identify if training is required.
D.
Evaluate system administrators' technical skills to identify if training is required.
Answers
Suggested answer: A

An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?

A.
More time has been allotted for testing.
A.
More time has been allotted for testing.
Answers
B.
The project is likely to deliver the product late.
B.
The project is likely to deliver the product late.
Answers
C.
A new project manager is handling the project.
C.
A new project manager is handling the project.
Answers
D.
The cost of the project will exceed the allotted budget.
D.
The cost of the project will exceed the allotted budget.
Answers
Suggested answer: B

Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?

A.
Device corruption
A.
Device corruption
Answers
B.
Data loss
B.
Data loss
Answers
C.
Malicious users
C.
Malicious users
Answers
D.
User support
D.
User support
Answers
Suggested answer: B

While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:

A.
review and update the policies to align with industry standards.
A.
review and update the policies to align with industry standards.
Answers
B.
determine that the policies should be updated annually.
B.
determine that the policies should be updated annually.
Answers
C.
report that the policies are adequate and do not need to be updated frequently.
C.
report that the policies are adequate and do not need to be updated frequently.
Answers
D.
review the policies against current needs to determine adequacy.
D.
review the policies against current needs to determine adequacy.
Answers
Suggested answer: D

A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner's BEST course of action when a compensating control needs to be applied?

A.
Obtain the risk owner's approval.
A.
Obtain the risk owner's approval.
Answers
B.
Record the risk as accepted in the risk register.
B.
Record the risk as accepted in the risk register.
Answers
C.
Inform senior management.
C.
Inform senior management.
Answers
D.
update the risk response plan.
D.
update the risk response plan.
Answers
Suggested answer: A

Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?

A.
Risk appetite
A.
Risk appetite
Answers
B.
Control cost
B.
Control cost
Answers
C.
Control effectiveness
C.
Control effectiveness
Answers
D.
Risk tolerance
D.
Risk tolerance
Answers
Suggested answer: C

An organization operates in an environment where reduced time-to-market for new software products is a top business priority. Which of the following should be the risk practitioner's GREATEST concern?

A.
Sufficient resources are not assigned to IT development projects.
A.
Sufficient resources are not assigned to IT development projects.
Answers
B.
Customer support help desk staff does not have adequate training.
B.
Customer support help desk staff does not have adequate training.
Answers
C.
Email infrastructure does not have proper rollback plans.
C.
Email infrastructure does not have proper rollback plans.
Answers
D.
The corporate email system does not identify and store phishing emails.
D.
The corporate email system does not identify and store phishing emails.
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120