ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 83

Question list
Search
Search

Related questions











Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?

A.
Likelihood of a threat
A.
Likelihood of a threat
Answers
B.
Impact of technology risk
B.
Impact of technology risk
Answers
C.
Impact of operational risk
C.
Impact of operational risk
Answers
D.
Control weakness
D.
Control weakness
Answers
Suggested answer: C

When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:

A.
cost-benefit analysis.
A.
cost-benefit analysis.
Answers
B.
risk appetite.
B.
risk appetite.
Answers
C.
regulatory guidelines
C.
regulatory guidelines
Answers
D.
control efficiency
D.
control efficiency
Answers
Suggested answer: A

In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?

A.
Implementation
A.
Implementation
Answers
B.
Development
B.
Development
Answers
C.
Design
C.
Design
Answers
D.
Feasibility
D.
Feasibility
Answers
Suggested answer: C

Days before the realization of an acquisition, a data breach is discovered at the company to be acquired. For the accruing organization, this situation represents which of the following?

A.
Threat event
A.
Threat event
Answers
B.
Inherent risk
B.
Inherent risk
Answers
C.
Risk event
C.
Risk event
Answers
D.
Security incident
D.
Security incident
Answers
Suggested answer: B

When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?

A.
Users may share accounts with business system analyst
A.
Users may share accounts with business system analyst
Answers
B.
Application may not capture a complete audit trail.
B.
Application may not capture a complete audit trail.
Answers
C.
Users may be able to circumvent application controls.
C.
Users may be able to circumvent application controls.
Answers
D.
Multiple connects to the database are used and slow the process
D.
Multiple connects to the database are used and slow the process
Answers
Suggested answer: C

Which of the following is the MOST important consideration for protecting data assets m a Business application system?

A.
Application controls are aligned with data classification lutes
A.
Application controls are aligned with data classification lutes
Answers
B.
Application users are periodically trained on proper data handling practices
B.
Application users are periodically trained on proper data handling practices
Answers
C.
Encrypted communication is established between applications and data servers
C.
Encrypted communication is established between applications and data servers
Answers
D.
Offsite encrypted backups are automatically created by the application
D.
Offsite encrypted backups are automatically created by the application
Answers
Suggested answer: A

Which of the following will help ensure the elective decision-making of an IT risk management committee?

A.
Key stakeholders are enrolled as members
A.
Key stakeholders are enrolled as members
Answers
B.
Approved minutes ate forwarded to senior management
B.
Approved minutes ate forwarded to senior management
Answers
C.
Committee meets at least quarterly
C.
Committee meets at least quarterly
Answers
D.
Functional overlap across the business is minimized
D.
Functional overlap across the business is minimized
Answers
Suggested answer: D

Which of the following is the BEST way to assess the effectiveness of an access management process?

A.
Comparing the actual process with the documented process
A.
Comparing the actual process with the documented process
Answers
B.
Reviewing access logs for user activity
B.
Reviewing access logs for user activity
Answers
C.
Reconciling a list of accounts belonging to terminated employees
C.
Reconciling a list of accounts belonging to terminated employees
Answers
D.
Reviewing for compliance with acceptable use policy
D.
Reviewing for compliance with acceptable use policy
Answers
Suggested answer: B

Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?

A.
Customized regional training on local laws and regulations
A.
Customized regional training on local laws and regulations
Answers
B.
Policies requiring central reporting of potential procedure exceptions
B.
Policies requiring central reporting of potential procedure exceptions
Answers
C.
Ongoing awareness training to support a common risk culture
C.
Ongoing awareness training to support a common risk culture
Answers
D.
Zero-tolerance policies for risk taking by middle-level managers
D.
Zero-tolerance policies for risk taking by middle-level managers
Answers
Suggested answer: A

Which of the following BEST indicates that additional or improved controls ate needed m the environment?

A.
Management, has decreased organisational risk appetite
A.
Management, has decreased organisational risk appetite
Answers
B.
The risk register and portfolio do not include all risk scenarios
B.
The risk register and portfolio do not include all risk scenarios
Answers
C.
merging risk scenarios have been identified
C.
merging risk scenarios have been identified
Answers
D.
Risk events and losses exceed risk tolerance
D.
Risk events and losses exceed risk tolerance
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120