ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 89

Question list
Search
Search

Related questions











Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?

A.
Privacy risk controls
A.
Privacy risk controls
Answers
B.
Business continuity
B.
Business continuity
Answers
C.
Risk taxonomy
C.
Risk taxonomy
Answers
D.
Management support
D.
Management support
Answers
Suggested answer: A

A risk practitioner has discovered a deficiency in a critical system that cannot be patched. Which of the following should be the risk practitioner's FIRST course of action?

A.
Report the issue to internal audit.
A.
Report the issue to internal audit.
Answers
B.
Submit a request to change management.
B.
Submit a request to change management.
Answers
C.
Conduct a risk assessment.
C.
Conduct a risk assessment.
Answers
D.
Review the business impact assessment.
D.
Review the business impact assessment.
Answers
Suggested answer: C

Which of the following practices MOST effectively safeguards the processing of personal data?

A.
Personal data attributed to a specific data subject is tokenized.
A.
Personal data attributed to a specific data subject is tokenized.
Answers
B.
Data protection impact assessments are performed on a regular basis.
B.
Data protection impact assessments are performed on a regular basis.
Answers
C.
Personal data certifications are performed to prevent excessive data collection.
C.
Personal data certifications are performed to prevent excessive data collection.
Answers
D.
Data retention guidelines are documented, established, and enforced.
D.
Data retention guidelines are documented, established, and enforced.
Answers
Suggested answer: B

Which of the following should be the PRIMARY goal of developing information security metrics?

A.
Raising security awareness
A.
Raising security awareness
Answers
B.
Enabling continuous improvement
B.
Enabling continuous improvement
Answers
C.
Identifying security threats
C.
Identifying security threats
Answers
D.
Ensuring regulatory compliance
D.
Ensuring regulatory compliance
Answers
Suggested answer: B

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

A.
Number of training sessions completed
A.
Number of training sessions completed
Answers
B.
Percentage of staff members who complete the training with a passing score
B.
Percentage of staff members who complete the training with a passing score
Answers
C.
Percentage of attendees versus total staff
C.
Percentage of attendees versus total staff
Answers
D.
Percentage of staff members who attend the training with positive feedback
D.
Percentage of staff members who attend the training with positive feedback
Answers
Suggested answer: B

A maturity model is MOST useful to an organization when it:

A.
benchmarks against other organizations
A.
benchmarks against other organizations
Answers
B.
defines a qualitative measure of risk
B.
defines a qualitative measure of risk
Answers
C.
provides a reference for progress
C.
provides a reference for progress
Answers
D.
provides risk metrics.
D.
provides risk metrics.
Answers
Suggested answer: C

A risk practitioner is preparing a report to communicate changes in the risk and control environment. The BEST way to engage stakeholder attention is to:

A.
include detailed deviations from industry benchmarks,
A.
include detailed deviations from industry benchmarks,
Answers
B.
include a summary linking information to stakeholder needs,
B.
include a summary linking information to stakeholder needs,
Answers
C.
include a roadmap to achieve operational excellence,
C.
include a roadmap to achieve operational excellence,
Answers
D.
publish the report on-demand for stakeholders.
D.
publish the report on-demand for stakeholders.
Answers
Suggested answer: B

The PRIMARY advantage of involving end users in continuity planning is that they:

A.
have a better understanding of specific business needs
A.
have a better understanding of specific business needs
Answers
B.
can balance the overall technical and business concerns
B.
can balance the overall technical and business concerns
Answers
C.
can see the overall impact to the business
C.
can see the overall impact to the business
Answers
D.
are more objective than information security management.
D.
are more objective than information security management.
Answers
Suggested answer: B

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

A.
Relevance
A.
Relevance
Answers
B.
Annual review
B.
Annual review
Answers
C.
Automation
C.
Automation
Answers
D.
Management approval
D.
Management approval
Answers
Suggested answer: A

Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?

A.
To provide data for establishing the risk profile
A.
To provide data for establishing the risk profile
Answers
B.
To provide assurance of adherence to risk management policies
B.
To provide assurance of adherence to risk management policies
Answers
C.
To provide measurements on the potential for risk to occur
C.
To provide measurements on the potential for risk to occur
Answers
D.
To provide assessments of mitigation effectiveness
D.
To provide assessments of mitigation effectiveness
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120