ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 84

Question list
Search
Search

Related questions











Which of The following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?

A.
Business continuity plan (BCP) testing results
A.
Business continuity plan (BCP) testing results
Answers
B.
Recovery lime objective (RTO)
B.
Recovery lime objective (RTO)
Answers
C.
Business impact analysis (BIA)
C.
Business impact analysis (BIA)
Answers
D.
results Recovery point objective (RPO)
D.
results Recovery point objective (RPO)
Answers
Suggested answer: C

A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?

A.
Escalate the concern to senior management.
A.
Escalate the concern to senior management.
Answers
B.
Document the reasons for the exception.
B.
Document the reasons for the exception.
Answers
C.
Include the application in IT risk assessments.
C.
Include the application in IT risk assessments.
Answers
D.
Propose that the application be transferred to IT.
D.
Propose that the application be transferred to IT.
Answers
Suggested answer: B

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

A.
Evaluating risk impact
A.
Evaluating risk impact
Answers
B.
Establishing key performance indicators (KPIs)
B.
Establishing key performance indicators (KPIs)
Answers
C.
Conducting internal audits
C.
Conducting internal audits
Answers
D.
Creating quarterly risk reports
D.
Creating quarterly risk reports
Answers
Suggested answer: A

A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?

A.
Customer database manager
A.
Customer database manager
Answers
B.
Customer data custodian
B.
Customer data custodian
Answers
C.
Data privacy officer
C.
Data privacy officer
Answers
D.
Audit committee
D.
Audit committee
Answers
Suggested answer: B

Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?

A.
Evaluate the security architecture maturity.
A.
Evaluate the security architecture maturity.
Answers
B.
Map the new requirements to the existing control framework.
B.
Map the new requirements to the existing control framework.
Answers
C.
Charter a privacy steering committee.
C.
Charter a privacy steering committee.
Answers
D.
Conduct a privacy impact assessment (PIA).
D.
Conduct a privacy impact assessment (PIA).
Answers
Suggested answer: D

An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?

A.
Conduct a risk analysis.
A.
Conduct a risk analysis.
Answers
B.
Initiate a remote data wipe.
B.
Initiate a remote data wipe.
Answers
C.
Invoke the incident response plan
C.
Invoke the incident response plan
Answers
D.
Disable the user account.
D.
Disable the user account.
Answers
Suggested answer: C

An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?

A.
Detective
A.
Detective
Answers
B.
Directive
B.
Directive
Answers
C.
Preventive
C.
Preventive
Answers
D.
Compensating
D.
Compensating
Answers
Suggested answer: B

The PRIMARY reason for prioritizing risk scenarios is to:

A.
provide an enterprise-wide view of risk
A.
provide an enterprise-wide view of risk
Answers
B.
support risk response tracking
B.
support risk response tracking
Answers
C.
assign risk ownership
C.
assign risk ownership
Answers
D.
facilitate risk response decisions.
D.
facilitate risk response decisions.
Answers
Suggested answer: D

The PRIMARY purpose of using a framework for risk analysis is to:

A.
improve accountability
A.
improve accountability
Answers
B.
improve consistency
B.
improve consistency
Answers
C.
help define risk tolerance
C.
help define risk tolerance
Answers
D.
help develop risk scenarios.
D.
help develop risk scenarios.
Answers
Suggested answer: B

Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?

A.
Enable data wipe capabilities
A.
Enable data wipe capabilities
Answers
B.
Penetration testing and session timeouts
B.
Penetration testing and session timeouts
Answers
C.
Implement remote monitoring
C.
Implement remote monitoring
Answers
D.
Enforce strong passwords and data encryption
D.
Enforce strong passwords and data encryption
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120