ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 88

Question list
Search
Search

List of questions

Search

Related questions











An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?

A.
Audit reports
A.
Audit reports
Answers
B.
Industry benchmarks
B.
Industry benchmarks
Answers
C.
Financial forecasts
C.
Financial forecasts
Answers
D.
Annual threat reports
D.
Annual threat reports
Answers
Suggested answer: B

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?

A.
Percentage of job failures identified and resolved during the recovery process
A.
Percentage of job failures identified and resolved during the recovery process
Answers
B.
Percentage of processes recovered within the recovery time and point objectives
B.
Percentage of processes recovered within the recovery time and point objectives
Answers
C.
Number of current test plans and procedures
C.
Number of current test plans and procedures
Answers
D.
Number of issues and action items resolved during the recovery test
D.
Number of issues and action items resolved during the recovery test
Answers
Suggested answer: B

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

A.
Periodic user privileges review
A.
Periodic user privileges review
Answers
B.
Log monitoring
B.
Log monitoring
Answers
C.
Periodic internal audits
C.
Periodic internal audits
Answers
D.
Segregation of duties
D.
Segregation of duties
Answers
Suggested answer: A

An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?

A.
Risk mitigation
A.
Risk mitigation
Answers
B.
Risk avoidance
B.
Risk avoidance
Answers
C.
Risk acceptance
C.
Risk acceptance
Answers
D.
Risk transfer
D.
Risk transfer
Answers
Suggested answer: A

Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?

A.
Key risk indicators (KRIs)
A.
Key risk indicators (KRIs)
Answers
B.
The owner of the financial reporting process
B.
The owner of the financial reporting process
Answers
C.
The risk rating of affected financial processes
C.
The risk rating of affected financial processes
Answers
D.
The list of relevant financial controls
D.
The list of relevant financial controls
Answers
Suggested answer: C

Which of the following is a drawback in the use of quantitative risk analysis?

A.
It assigns numeric values to exposures of assets.
A.
It assigns numeric values to exposures of assets.
Answers
B.
It requires more resources than other methods
B.
It requires more resources than other methods
Answers
C.
It produces the results in numeric form.
C.
It produces the results in numeric form.
Answers
D.
It is based on impact analysis of information assets.
D.
It is based on impact analysis of information assets.
Answers
Suggested answer: B

Which of the following would present the MOST significant risk to an organization when updating the incident response plan?

A.
Obsolete response documentation
A.
Obsolete response documentation
Answers
B.
Increased stakeholder turnover
B.
Increased stakeholder turnover
Answers
C.
Failure to audit third-party providers
C.
Failure to audit third-party providers
Answers
D.
Undefined assignment of responsibility
D.
Undefined assignment of responsibility
Answers
Suggested answer: D

An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?

A.
Data retention requirements
A.
Data retention requirements
Answers
B.
Data destruction requirements
B.
Data destruction requirements
Answers
C.
Cloud storage architecture
C.
Cloud storage architecture
Answers
D.
Key management
D.
Key management
Answers
Suggested answer: D

Which of the following would BEST indicate to senior management that IT processes are improving?

A.
Changes in the number of intrusions detected
A.
Changes in the number of intrusions detected
Answers
B.
Changes in the number of security exceptions
B.
Changes in the number of security exceptions
Answers
C.
Changes in the position in the maturity model
C.
Changes in the position in the maturity model
Answers
D.
Changes to the structure of the risk register
D.
Changes to the structure of the risk register
Answers
Suggested answer: B

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

A.
Identifying critical information assets
A.
Identifying critical information assets
Answers
B.
Identifying events impacting continuity of operations;
B.
Identifying events impacting continuity of operations;
Answers
C.
Creating a data classification scheme
C.
Creating a data classification scheme
Answers
D.
Analyzing previous risk assessment results
D.
Analyzing previous risk assessment results
Answers
Suggested answer: A
Total 1.200 questions
Go to page: of 120