ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 93

Question list
Search
Search

List of questions

Search

Related questions











Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?

A.
Gap analysis
A.
Gap analysis
Answers
B.
Threat assessment
B.
Threat assessment
Answers
C.
Resource skills matrix
C.
Resource skills matrix
Answers
D.
Data quality assurance plan
D.
Data quality assurance plan
Answers
Suggested answer: A

An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?

A.
Periodically review application on BYOD devices
A.
Periodically review application on BYOD devices
Answers
B.
Include BYOD in organizational awareness programs
B.
Include BYOD in organizational awareness programs
Answers
C.
Implement BYOD mobile device management (MDM) controls.
C.
Implement BYOD mobile device management (MDM) controls.
Answers
D.
Enable a remote wee capability for BYOD devices
D.
Enable a remote wee capability for BYOD devices
Answers
Suggested answer: C

Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?

A.
Number of service level agreement (SLA) violations
A.
Number of service level agreement (SLA) violations
Answers
B.
Percentage of recovery issues identified during the exercise
B.
Percentage of recovery issues identified during the exercise
Answers
C.
Number of total systems recovered within tie recovery point objective (RPO)
C.
Number of total systems recovered within tie recovery point objective (RPO)
Answers
D.
Percentage of critical systems recovered within tie recovery time objective (RTO)
D.
Percentage of critical systems recovered within tie recovery time objective (RTO)
Answers
Suggested answer: D

Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?

A.
Well documented policies and procedures
A.
Well documented policies and procedures
Answers
B.
Risk and issue tracking
B.
Risk and issue tracking
Answers
C.
An IT strategy committee
C.
An IT strategy committee
Answers
D.
Change and release management
D.
Change and release management
Answers
Suggested answer: B

An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:

A.
a recognized industry control framework
A.
a recognized industry control framework
Answers
B.
guidance provided by the external auditor
B.
guidance provided by the external auditor
Answers
C.
the service provider's existing controls
C.
the service provider's existing controls
Answers
D.
The organization's specific control requirements
D.
The organization's specific control requirements
Answers
Suggested answer: D

A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?

A.
implement code reviews and Quality assurance on a regular basis
A.
implement code reviews and Quality assurance on a regular basis
Answers
B.
Verity me software agreement indemnifies the company from losses
B.
Verity me software agreement indemnifies the company from losses
Answers
C.
Review the source coda and error reporting of the application
C.
Review the source coda and error reporting of the application
Answers
D.
Update the software with the latest patches and updates
D.
Update the software with the latest patches and updates
Answers
Suggested answer: D

Which of the following is MOST important information to review when developing plans for using emerging technologies?

A.
Existing IT environment
A.
Existing IT environment
Answers
B.
IT strategic plan
B.
IT strategic plan
Answers
C.
Risk register
C.
Risk register
Answers
D.
Organizational strategic plan
D.
Organizational strategic plan
Answers
Suggested answer: D

What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?

A.
Reduce internal threats
A.
Reduce internal threats
Answers
B.
Reduce exposure to vulnerabilities
B.
Reduce exposure to vulnerabilities
Answers
C.
Eliminate risk associated with personnel
C.
Eliminate risk associated with personnel
Answers
D.
Ensure new hires have the required skills
D.
Ensure new hires have the required skills
Answers
Suggested answer: C

Before assigning sensitivity levels to information it is MOST important to:

A.
define recovery time objectives (RTOs).
A.
define recovery time objectives (RTOs).
Answers
B.
define the information classification policy
B.
define the information classification policy
Answers
C.
conduct a sensitivity analyse
C.
conduct a sensitivity analyse
Answers
D.
Identify information custodians
D.
Identify information custodians
Answers
Suggested answer: B

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

A.
The volume of risk scenarios is too large
A.
The volume of risk scenarios is too large
Answers
B.
Risk aggregation has not been completed
B.
Risk aggregation has not been completed
Answers
C.
Risk scenarios are not applicable
C.
Risk scenarios are not applicable
Answers
D.
The risk analysts for each scenario is incomplete
D.
The risk analysts for each scenario is incomplete
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120