ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 81

Question list
Search
Search

Related questions











When of the following 15 MOST important when developing a business case for a proposed security investment?

A.
identification of control requirements
A.
identification of control requirements
Answers
B.
Alignment to business objectives
B.
Alignment to business objectives
Answers
C.
Consideration of new business strategies
C.
Consideration of new business strategies
Answers
D.
inclusion of strategy for regulatory compliance
D.
inclusion of strategy for regulatory compliance
Answers
Suggested answer: B

What are the MOST essential attributes of an effective Key control indicator (KCI)?

A.
Flexibility and adaptability
A.
Flexibility and adaptability
Answers
B.
Measurability and consistency
B.
Measurability and consistency
Answers
C.
Robustness and resilience
C.
Robustness and resilience
Answers
D.
Optimal cost and benefit
D.
Optimal cost and benefit
Answers
Suggested answer: B

When of the following provides the MOST tenable evidence that a business process control is effective?

A.
Demonstration that the control is operating as designed
A.
Demonstration that the control is operating as designed
Answers
B.
A successful walk-through of the associated risk assessment
B.
A successful walk-through of the associated risk assessment
Answers
C.
Management attestation that the control is operating effectively
C.
Management attestation that the control is operating effectively
Answers
D.
Automated data indicating that risk has been reduced
D.
Automated data indicating that risk has been reduced
Answers
Suggested answer: C

During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?

A.
Review the cost-benefit of mitigating controls
A.
Review the cost-benefit of mitigating controls
Answers
B.
Mark the risk status as unresolved within the risk register
B.
Mark the risk status as unresolved within the risk register
Answers
C.
Verify the sufficiency of mitigating controls with the risk owner
C.
Verify the sufficiency of mitigating controls with the risk owner
Answers
D.
Update the risk register with implemented mitigating actions
D.
Update the risk register with implemented mitigating actions
Answers
Suggested answer: A

What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?

A.
Risk impact
A.
Risk impact
Answers
B.
Risk likelihood
B.
Risk likelihood
Answers
C.
Risk appropriate
C.
Risk appropriate
Answers
D.
Control self-assessments (CSAs)
D.
Control self-assessments (CSAs)
Answers
Suggested answer: B

Which of the following controls are BEST strengthened by a clear organizational code of ethics?

A.
Detective controls
A.
Detective controls
Answers
B.
Administrative controls
B.
Administrative controls
Answers
C.
Technical controls
C.
Technical controls
Answers
D.
Preventive controls
D.
Preventive controls
Answers
Suggested answer: B

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

A.
The value at which control effectiveness would fail
A.
The value at which control effectiveness would fail
Answers
B.
Thresholds benchmarked to peer organizations
B.
Thresholds benchmarked to peer organizations
Answers
C.
A typical operational value
C.
A typical operational value
Answers
D.
A value that represents the intended control state
D.
A value that represents the intended control state
Answers
Suggested answer: A

Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?

A.
Establish baseline security configurations with the cloud service provider.
A.
Establish baseline security configurations with the cloud service provider.
Answers
B.
Require the cloud prowler 10 disclose past data privacy breaches.
B.
Require the cloud prowler 10 disclose past data privacy breaches.
Answers
C.
Ensure the cloud service provider performs an annual risk assessment.
C.
Ensure the cloud service provider performs an annual risk assessment.
Answers
D.
Specify cloud service provider liability for data privacy breaches in the contract
D.
Specify cloud service provider liability for data privacy breaches in the contract
Answers
Suggested answer: D

Which of tie following is We MOST important consideration when implementing ethical remote work monitoring?

A.
Monitoring is only conducted between official hours of business
A.
Monitoring is only conducted between official hours of business
Answers
B.
Employees are informed of how they are bong monitored
B.
Employees are informed of how they are bong monitored
Answers
C.
Reporting on nonproductive employees is sent to management on a scheduled basis
C.
Reporting on nonproductive employees is sent to management on a scheduled basis
Answers
D.
Multiple data monitoring sources are integrated into security incident response procedures
D.
Multiple data monitoring sources are integrated into security incident response procedures
Answers
Suggested answer: B

An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?

A.
The third party's IT operations manager
A.
The third party's IT operations manager
Answers
B.
The organization's process owner
B.
The organization's process owner
Answers
C.
The third party's chief risk officer (CRO)
C.
The third party's chief risk officer (CRO)
Answers
D.
The organization's risk practitioner
D.
The organization's risk practitioner
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120