ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 78

Question list
Search
Search

Related questions











When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?

A.
An analysis of the security logs that illustrate the sequence of events
A.
An analysis of the security logs that illustrate the sequence of events
Answers
B.
An analysis of the impact of similar attacks in other organizations
B.
An analysis of the impact of similar attacks in other organizations
Answers
C.
A business case for implementing stronger logical access controls
C.
A business case for implementing stronger logical access controls
Answers
D.
A justification of corrective action taken
D.
A justification of corrective action taken
Answers
Suggested answer: B

Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?

A.
Failed login attempts
A.
Failed login attempts
Answers
B.
Simulating a denial of service attack
B.
Simulating a denial of service attack
Answers
C.
Absence of IT audit findings
C.
Absence of IT audit findings
Answers
D.
Penetration test
D.
Penetration test
Answers
Suggested answer: D

Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?

A.
Key risk indicators (KRIs)
A.
Key risk indicators (KRIs)
Answers
B.
Risk scenarios
B.
Risk scenarios
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
Threat analysis
D.
Threat analysis
Answers
Suggested answer: B

Which of the following is the GREATEST concern associated with redundant data in an organization's inventory system?

A.
Poor access control
A.
Poor access control
Answers
B.
Unnecessary data storage usage
B.
Unnecessary data storage usage
Answers
C.
Data inconsistency
C.
Data inconsistency
Answers
D.
Unnecessary costs of program changes
D.
Unnecessary costs of program changes
Answers
Suggested answer: C

What is the PRIMARY benefit of risk monitoring?

A.
It reduces the number of audit findings.
A.
It reduces the number of audit findings.
Answers
B.
It provides statistical evidence of control efficiency.
B.
It provides statistical evidence of control efficiency.
Answers
C.
It facilitates risk-aware decision making.
C.
It facilitates risk-aware decision making.
Answers
D.
It facilitates communication of threat levels.
D.
It facilitates communication of threat levels.
Answers
Suggested answer: C

Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?

A.
KRI design must precede definition of KCIs.
A.
KRI design must precede definition of KCIs.
Answers
B.
KCIs and KRIs are independent indicators and do not impact each other.
B.
KCIs and KRIs are independent indicators and do not impact each other.
Answers
C.
A decreasing trend of KRI readings will lead to changes to KCIs.
C.
A decreasing trend of KRI readings will lead to changes to KCIs.
Answers
D.
Both KRIs and KCIs provide insight to potential changes in the level of risk.
D.
Both KRIs and KCIs provide insight to potential changes in the level of risk.
Answers
Suggested answer: A

Which of the following trends would cause the GREATEST concern regarding the effectiveness of an organization's user access control processes? An increase in the:

A.
ratio of disabled to active user accounts.
A.
ratio of disabled to active user accounts.
Answers
B.
percentage of users with multiple user accounts.
B.
percentage of users with multiple user accounts.
Answers
C.
average number of access entitlements per user account.
C.
average number of access entitlements per user account.
Answers
D.
average time between user transfers and access updates.
D.
average time between user transfers and access updates.
Answers
Suggested answer: D

Which of the following is the MOST important objective of an enterprise risk management (ERM) program?

A.
To create a complete repository of risk to the organization
A.
To create a complete repository of risk to the organization
Answers
B.
To create a comprehensive view of critical risk to the organization
B.
To create a comprehensive view of critical risk to the organization
Answers
C.
To provide a bottom-up view of the most significant risk scenarios
C.
To provide a bottom-up view of the most significant risk scenarios
Answers
D.
To optimize costs of managing risk scenarios in the organization
D.
To optimize costs of managing risk scenarios in the organization
Answers
Suggested answer: B

To help identify high-risk situations, an organization should:

A.
continuously monitor the environment.
A.
continuously monitor the environment.
Answers
B.
develop key performance indicators (KPIs).
B.
develop key performance indicators (KPIs).
Answers
C.
maintain a risk matrix.
C.
maintain a risk matrix.
Answers
D.
maintain a risk register.
D.
maintain a risk register.
Answers
Suggested answer: A

Who should be accountable for monitoring the control environment to ensure controls are effective?

A.
Risk owner
A.
Risk owner
Answers
B.
Security monitoring operations
B.
Security monitoring operations
Answers
C.
Impacted data owner
C.
Impacted data owner
Answers
D.
System owner
D.
System owner
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120