ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 91

Question list
Search
Search

List of questions

Search

Related questions











An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

A.
Transborder data transfer restrictions
A.
Transborder data transfer restrictions
Answers
B.
Differences in regional standards
B.
Differences in regional standards
Answers
C.
Lack of monitoring over vendor activities
C.
Lack of monitoring over vendor activities
Answers
D.
Lack of after-hours incident management support
D.
Lack of after-hours incident management support
Answers
Suggested answer: C

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.
Board of directors
A.
Board of directors
Answers
B.
Vendors
B.
Vendors
Answers
C.
Regulators
C.
Regulators
Answers
D.
Legal team
D.
Legal team
Answers
Suggested answer: A

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

A.
involve IT leadership in the policy development process
A.
involve IT leadership in the policy development process
Answers
B.
Require business users to sign acknowledgment of the poises
B.
Require business users to sign acknowledgment of the poises
Answers
C.
involve business owners in the pokey development process
C.
involve business owners in the pokey development process
Answers
D.
Provide policy owners with greater enforcement authority
D.
Provide policy owners with greater enforcement authority
Answers
Suggested answer: B

A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach

A.
fail to identity all relevant issues.
A.
fail to identity all relevant issues.
Answers
B.
be too costly
B.
be too costly
Answers
C.
violate laws in other countries
C.
violate laws in other countries
Answers
D.
be too line consuming
D.
be too line consuming
Answers
Suggested answer: C

An organization's control environment is MOST effective when:

A.
controls perform as intended.
A.
controls perform as intended.
Answers
B.
controls operate efficiently.
B.
controls operate efficiently.
Answers
C.
controls are implemented consistent
C.
controls are implemented consistent
Answers
D.
control designs are reviewed periodically
D.
control designs are reviewed periodically
Answers
Suggested answer: A

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.
Control owner
A.
Control owner
Answers
B.
Risk owner
B.
Risk owner
Answers
C.
Internal auditor
C.
Internal auditor
Answers
D.
Compliance manager
D.
Compliance manager
Answers
Suggested answer: C

The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.

After implementing countermeasures listed in ''Risk Response Descriptions'' for each of the Risk IDs, which of the following component of the register MUST change?

A.
Risk Impact Rating
A.
Risk Impact Rating
Answers
B.
Risk Owner
B.
Risk Owner
Answers
C.
Risk Likelihood Rating
C.
Risk Likelihood Rating
Answers
D.
Risk Exposure
D.
Risk Exposure
Answers
Suggested answer: B

Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?

A.
Internal auditor
A.
Internal auditor
Answers
B.
Asset owner
B.
Asset owner
Answers
C.
Finance manager
C.
Finance manager
Answers
D.
Control owner
D.
Control owner
Answers
Suggested answer: B

An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?

A.
Acquisition
A.
Acquisition
Answers
B.
Implementation
B.
Implementation
Answers
C.
Initiation
C.
Initiation
Answers
D.
Operation and maintenance
D.
Operation and maintenance
Answers
Suggested answer: C

Recovery the objectives (RTOs) should be based on

A.
minimum tolerable downtime
A.
minimum tolerable downtime
Answers
B.
minimum tolerable loss of data.
B.
minimum tolerable loss of data.
Answers
C.
maximum tolerable downtime.
C.
maximum tolerable downtime.
Answers
D.
maximum tolerable loss of data
D.
maximum tolerable loss of data
Answers
Suggested answer: C
Total 1.200 questions
Go to page: of 120