ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 86

Question list
Search
Search

List of questions

Search

Related questions











The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

A.
obtain the support of executive management.
A.
obtain the support of executive management.
Answers
B.
map the business processes to supporting IT and other corporate resources.
B.
map the business processes to supporting IT and other corporate resources.
Answers
C.
identify critical business processes and the degree of reliance on support services.
C.
identify critical business processes and the degree of reliance on support services.
Answers
D.
document the disaster recovery process.
D.
document the disaster recovery process.
Answers
Suggested answer: C

Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?

A.
Mean time to recover (MTTR)
A.
Mean time to recover (MTTR)
Answers
B.
IT system criticality classification
B.
IT system criticality classification
Answers
C.
Incident management service level agreement (SLA)
C.
Incident management service level agreement (SLA)
Answers
D.
Recovery time objective (RTO)
D.
Recovery time objective (RTO)
Answers
Suggested answer: D

Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?

A.
Multi-factor authentication
A.
Multi-factor authentication
Answers
B.
Role-based access controls
B.
Role-based access controls
Answers
C.
Activation of control audits
C.
Activation of control audits
Answers
D.
Acceptable use policies
D.
Acceptable use policies
Answers
Suggested answer: A

Which of the following should be determined FIRST when a new security vulnerability is made public?

A.
Whether the affected technology is used within the organization
A.
Whether the affected technology is used within the organization
Answers
B.
Whether the affected technology is Internet-facing
B.
Whether the affected technology is Internet-facing
Answers
C.
What mitigating controls are currently in place
C.
What mitigating controls are currently in place
Answers
D.
How pervasive the vulnerability is within the organization
D.
How pervasive the vulnerability is within the organization
Answers
Suggested answer: A

Which of the following should be of GREATEST concern lo a risk practitioner reviewing the implementation of an emerging technology?

A.
Lack of alignment to best practices
A.
Lack of alignment to best practices
Answers
B.
Lack of risk assessment
B.
Lack of risk assessment
Answers
C.
Lack of risk and control procedures
C.
Lack of risk and control procedures
Answers
D.
Lack of management approval
D.
Lack of management approval
Answers
Suggested answer: B

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.
Insurance coverage
A.
Insurance coverage
Answers
B.
Security awareness training
B.
Security awareness training
Answers
C.
Policies and standards
C.
Policies and standards
Answers
D.
Risk appetite and tolerance
D.
Risk appetite and tolerance
Answers
Suggested answer: C

When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?

A.
Mapping threats to organizational objectives
A.
Mapping threats to organizational objectives
Answers
B.
Reviewing past audits
B.
Reviewing past audits
Answers
C.
Analyzing key risk indicators (KRIs)
C.
Analyzing key risk indicators (KRIs)
Answers
D.
Identifying potential sources of risk
D.
Identifying potential sources of risk
Answers
Suggested answer: D

An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the country where it is collected. Which of the following should be done FIRST when addressing this situation?

A.
Analyze data protection methods.
A.
Analyze data protection methods.
Answers
B.
Understand data flows.
B.
Understand data flows.
Answers
C.
Include a right-to-audit clause.
C.
Include a right-to-audit clause.
Answers
D.
Implement strong access controls.
D.
Implement strong access controls.
Answers
Suggested answer: B

Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?

A.
Request a budget for implementation
A.
Request a budget for implementation
Answers
B.
Conduct a threat analysis.
B.
Conduct a threat analysis.
Answers
C.
Create a cloud computing policy.
C.
Create a cloud computing policy.
Answers
D.
Perform a controls assessment.
D.
Perform a controls assessment.
Answers
Suggested answer: B

Which of the following is the BEST way to quantify the likelihood of risk materialization?

A.
Balanced scorecard
A.
Balanced scorecard
Answers
B.
Threat and vulnerability assessment
B.
Threat and vulnerability assessment
Answers
C.
Compliance assessments
C.
Compliance assessments
Answers
D.
Business impact analysis (BIA)
D.
Business impact analysis (BIA)
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120