ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 9

Question list
Search
Search

Related questions











Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?

A.
Align business objectives to the risk profile.
A.
Align business objectives to the risk profile.
Answers
B.
Assess risk against business objectives
B.
Assess risk against business objectives
Answers
C.
Implement an organization-specific risk taxonomy.
C.
Implement an organization-specific risk taxonomy.
Answers
D.
Explain risk details to management.
D.
Explain risk details to management.
Answers
Suggested answer: B

Which of the following would BEST ensure that identified risk scenarios are addressed?

A.
Reviewing the implementation of the risk response
A.
Reviewing the implementation of the risk response
Answers
B.
Creating a separate risk register for key business units
B.
Creating a separate risk register for key business units
Answers
C.
Performing real-time monitoring of threats
C.
Performing real-time monitoring of threats
Answers
D.
Performing regular risk control self-assessments
D.
Performing regular risk control self-assessments
Answers
Suggested answer: C

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.
communication
A.
communication
Answers
B.
identification.
B.
identification.
Answers
C.
treatment.
C.
treatment.
Answers
D.
assessment.
D.
assessment.
Answers
Suggested answer: D

The PRIMARY objective of testing the effectiveness of a new control before implementation is to:

A.
ensure that risk is mitigated by the control.
A.
ensure that risk is mitigated by the control.
Answers
B.
measure efficiency of the control process.
B.
measure efficiency of the control process.
Answers
C.
confirm control alignment with business objectives.
C.
confirm control alignment with business objectives.
Answers
D.
comply with the organization's policy.
D.
comply with the organization's policy.
Answers
Suggested answer: C

Which of the following is the PRIMARY reason to perform ongoing risk assessments?

A.
Emerging risk must be continuously reported to management.
A.
Emerging risk must be continuously reported to management.
Answers
B.
New system vulnerabilities emerge at frequent intervals.
B.
New system vulnerabilities emerge at frequent intervals.
Answers
C.
The risk environment is subject to change.
C.
The risk environment is subject to change.
Answers
D.
The information security budget must be justified.
D.
The information security budget must be justified.
Answers
Suggested answer: C

Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

A.
a gap analysis
A.
a gap analysis
Answers
B.
a root cause analysis.
B.
a root cause analysis.
Answers
C.
an impact assessment.
C.
an impact assessment.
Answers
D.
a vulnerability assessment.
D.
a vulnerability assessment.
Answers
Suggested answer: B

Which of the following is MOST effective against external threats to an organizations confidential information?

A.
Single sign-on
A.
Single sign-on
Answers
B.
Data integrity checking
B.
Data integrity checking
Answers
C.
Strong authentication
C.
Strong authentication
Answers
D.
Intrusion detection system
D.
Intrusion detection system
Answers
Suggested answer: C

Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?

A.
A robust risk aggregation tool set
A.
A robust risk aggregation tool set
Answers
B.
Clearly defined roles and responsibilities
B.
Clearly defined roles and responsibilities
Answers
C.
A well-established risk management committee
C.
A well-established risk management committee
Answers
D.
Well-documented and communicated escalation procedures
D.
Well-documented and communicated escalation procedures
Answers
Suggested answer: B

Which of the following is the MOST important characteristic of an effective risk management program?

A.
Risk response plans are documented
A.
Risk response plans are documented
Answers
B.
Controls are mapped to key risk scenarios.
B.
Controls are mapped to key risk scenarios.
Answers
C.
Key risk indicators are defined.
C.
Key risk indicators are defined.
Answers
D.
Risk ownership is assigned
D.
Risk ownership is assigned
Answers
Suggested answer: D

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

A.
Risk questionnaire
A.
Risk questionnaire
Answers
B.
Risk register
B.
Risk register
Answers
C.
Management assertion
C.
Management assertion
Answers
D.
Compliance manual
D.
Compliance manual
Answers
Suggested answer: B
Total 1.200 questions
Go to page: of 120