ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 85

Question list
Search
Search

List of questions

Search

Related questions











To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?

A.
The risk governance approach of the second and third lines of defense may differ.
A.
The risk governance approach of the second and third lines of defense may differ.
Answers
B.
The independence of the internal third line of defense may be compromised.
B.
The independence of the internal third line of defense may be compromised.
Answers
C.
Cost reductions may negatively impact the productivity of other departments.
C.
Cost reductions may negatively impact the productivity of other departments.
Answers
D.
The new structure is not aligned to the organization's internal control framework.
D.
The new structure is not aligned to the organization's internal control framework.
Answers
Suggested answer: B

Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?

A.
Designing compensating controls
A.
Designing compensating controls
Answers
B.
Determining if KRIs have been updated recently
B.
Determining if KRIs have been updated recently
Answers
C.
Assessing the effectiveness of the incident response plan
C.
Assessing the effectiveness of the incident response plan
Answers
D.
Determining what has changed in the environment
D.
Determining what has changed in the environment
Answers
Suggested answer: D

Legal and regulatory risk associated with business conducted over the Internet is driven by:

A.
the jurisdiction in which an organization has its principal headquarters
A.
the jurisdiction in which an organization has its principal headquarters
Answers
B.
international law and a uniform set of regulations.
B.
international law and a uniform set of regulations.
Answers
C.
the laws and regulations of each individual country
C.
the laws and regulations of each individual country
Answers
D.
international standard-setting bodies.
D.
international standard-setting bodies.
Answers
Suggested answer: C

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

A.
Sharing company information on social media
A.
Sharing company information on social media
Answers
B.
Sharing personal information on social media
B.
Sharing personal information on social media
Answers
C.
Using social media to maintain contact with business associates
C.
Using social media to maintain contact with business associates
Answers
D.
Using social media for personal purposes during working hours
D.
Using social media for personal purposes during working hours
Answers
Suggested answer: A

Which of the following should be the PRIMARY focus of an IT risk awareness program?

A.
Ensure compliance with the organization's internal policies
A.
Ensure compliance with the organization's internal policies
Answers
B.
Cultivate long-term behavioral change.
B.
Cultivate long-term behavioral change.
Answers
C.
Communicate IT risk policy to the participants.
C.
Communicate IT risk policy to the participants.
Answers
D.
Demonstrate regulatory compliance.
D.
Demonstrate regulatory compliance.
Answers
Suggested answer: B

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

A.
Educating employees on what needs to be kept confidential
A.
Educating employees on what needs to be kept confidential
Answers
B.
Implementing a data loss prevention (DLP) solution
B.
Implementing a data loss prevention (DLP) solution
Answers
C.
Taking punitive action against employees who expose confidential data
C.
Taking punitive action against employees who expose confidential data
Answers
D.
Requiring employees to sign nondisclosure agreements
D.
Requiring employees to sign nondisclosure agreements
Answers
Suggested answer: B

Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?

A.
Apply available security patches.
A.
Apply available security patches.
Answers
B.
Schedule a penetration test.
B.
Schedule a penetration test.
Answers
C.
Conduct a business impact analysis (BIA)
C.
Conduct a business impact analysis (BIA)
Answers
D.
Perform a vulnerability analysis.
D.
Perform a vulnerability analysis.
Answers
Suggested answer: C

Risk acceptance of an exception to a security control would MOST likely be justified when:

A.
automation cannot be applied to the control
A.
automation cannot be applied to the control
Answers
B.
business benefits exceed the loss exposure.
B.
business benefits exceed the loss exposure.
Answers
C.
the end-user license agreement has expired.
C.
the end-user license agreement has expired.
Answers
D.
the control is difficult to enforce in practice.
D.
the control is difficult to enforce in practice.
Answers
Suggested answer: B

Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?

A.
Requiring a printer access code for each user
A.
Requiring a printer access code for each user
Answers
B.
Using physical controls to access the printer room
B.
Using physical controls to access the printer room
Answers
C.
Using video surveillance in the printer room
C.
Using video surveillance in the printer room
Answers
D.
Ensuring printer parameters are properly configured
D.
Ensuring printer parameters are properly configured
Answers
Suggested answer: A

For a large software development project, risk assessments are MOST effective when performed:

A.
before system development begins.
A.
before system development begins.
Answers
B.
at system development.
B.
at system development.
Answers
C.
at each stage of the system development life cycle (SDLC).
C.
at each stage of the system development life cycle (SDLC).
Answers
D.
during the development of the business case.
D.
during the development of the business case.
Answers
Suggested answer: C
Total 1.200 questions
Go to page: of 120