ExamGecko
Home Home / Isaca / CRISC

Isaca CRISC Practice Test - Questions Answers, Page 94

Question list
Search
Search

List of questions

Search

Related questions











When of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk register maintenance?

A.
Remove risk that has been mitigated by third-party transfer
A.
Remove risk that has been mitigated by third-party transfer
Answers
B.
Remove risk that management has decided to accept
B.
Remove risk that management has decided to accept
Answers
C.
Remove risk only following a significant change in the risk environment
C.
Remove risk only following a significant change in the risk environment
Answers
D.
Remove risk when mitigation results in residual risk within tolerance levels
D.
Remove risk when mitigation results in residual risk within tolerance levels
Answers
Suggested answer: C

Which of the blowing is MOST important when implementing an organization s security policy?

A.
Obtaining management support
A.
Obtaining management support
Answers
B.
Benchmarking against industry standards
B.
Benchmarking against industry standards
Answers
C.
Assessing compliance requirements
C.
Assessing compliance requirements
Answers
D.
Identifying threats and vulnerabilities
D.
Identifying threats and vulnerabilities
Answers
Suggested answer: A

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to' owing would provide the MOST useful information to determine mitigating controls?

A.
Forensic analysis
A.
Forensic analysis
Answers
B.
Risk assessment
B.
Risk assessment
Answers
C.
Root cause analysis
C.
Root cause analysis
Answers
D.
Business impact analysis (BlA)
D.
Business impact analysis (BlA)
Answers
Suggested answer: A

A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner's BEST course of action to determine root cause?

A.
Review the risk profile
A.
Review the risk profile
Answers
B.
Review pokey change history
B.
Review pokey change history
Answers
C.
interview the control owner
C.
interview the control owner
Answers
D.
Perform control testing
D.
Perform control testing
Answers
Suggested answer: C

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

A.
data logging and monitoring
A.
data logging and monitoring
Answers
B.
data mining and analytics
B.
data mining and analytics
Answers
C.
data classification and labeling
C.
data classification and labeling
Answers
D.
data retention and destruction
D.
data retention and destruction
Answers
Suggested answer: C

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

A.
IT risk practitioner
A.
IT risk practitioner
Answers
B.
Third -partf3ecurity team
B.
Third -partf3ecurity team
Answers
C.
The relationship owner
C.
The relationship owner
Answers
D.
Legal representation of the business
D.
Legal representation of the business
Answers
Suggested answer: C

Which of the following would MOST likely require a risk practitioner to update the risk register?

A.
An alert being reported by the security operations center.
A.
An alert being reported by the security operations center.
Answers
B.
Development of a project schedule for implementing a risk response
B.
Development of a project schedule for implementing a risk response
Answers
C.
Completion of a project for implementing a new control
C.
Completion of a project for implementing a new control
Answers
D.
Engagement of a third party to conduct a vulnerability scan
D.
Engagement of a third party to conduct a vulnerability scan
Answers
Suggested answer: C

An IT risk threat analysis is BEST used to establish

A.
risk scenarios
A.
risk scenarios
Answers
B.
risk maps
B.
risk maps
Answers
C.
risk appetite
C.
risk appetite
Answers
D.
risk ownership.
D.
risk ownership.
Answers
Suggested answer: A

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

A.
Verify authorization by senior management.
A.
Verify authorization by senior management.
Answers
B.
Increase the risk appetite to align with the current risk level
B.
Increase the risk appetite to align with the current risk level
Answers
C.
Ensure the acceptance is set to expire over lime
C.
Ensure the acceptance is set to expire over lime
Answers
D.
Update the risk response in the risk register.
D.
Update the risk response in the risk register.
Answers
Suggested answer: A

Which of the following would provide the BEST evidence of an effective internal control environment/?

A.
Risk assessment results
A.
Risk assessment results
Answers
B.
Adherence to governing policies
B.
Adherence to governing policies
Answers
C.
Regular stakeholder briefings
C.
Regular stakeholder briefings
Answers
D.
Independent audit results
D.
Independent audit results
Answers
Suggested answer: D
Total 1.200 questions
Go to page: of 120