New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-50 out of questions
Questions # 1:

Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?

Options:

A.

Deleting the data from the file system


B.

Cryptographically scrambling the data


C.

Formatting the cloud storage at the block level


D.

Degaussing the cloud storage media


Expert Solution
Questions # 2:

Accountability for a particular risk is BEST represented in a:

Options:

A.

risk register


B.

risk catalog


C.

risk scenario


D.

RACI matrix


Expert Solution
Questions # 3:

Which of the following events is MOST likely to trigger the need to conduct a risk assessment?

Options:

A.

An incident resulting in data loss


B.

Changes in executive management


C.

Updates to the information security policy


D.

Introduction of a new product line


Expert Solution
Questions # 4:

Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST

Options:

A.

review the key risk indicators.


B.

conduct a risk analysis.


C.

update the risk register


D.

reallocate risk response resources.


Expert Solution
Questions # 5:

Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?

Options:

A.

The model could be hacked or exploited.


B.

The model could be used to generate inaccurate content.


C.

Staff could become overly reliant on the model.


D.

It could lead to biased recommendations.


Expert Solution
Questions # 6:

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

Options:

A.

Develop a compensating control.


B.

Allocate remediation resources.


C.

Perform a cost-benefit analysis.


D.

Identify risk responses


Expert Solution
Questions # 7:

An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?

Options:

A.

Conduct a risk analysis.


B.

Initiate a remote data wipe.


C.

Invoke the incident response plan


D.

Disable the user account.


Expert Solution
Questions # 8:

During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:

Options:

A.

reset the alert threshold based on peak traffic


B.

analyze the traffic to minimize the false negatives


C.

analyze the alerts to minimize the false positives


D.

sniff the traffic using a network analyzer


Expert Solution
Questions # 9:

While reviewing an organization's monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?

Options:

A.

Temporarily suspend emergency changes.


B.

Document the control deficiency in the risk register.


C.

Conduct a root cause analysis.


D.

Continue monitoring change management metrics.


Expert Solution
Questions # 10:

To help ensure the success of a major IT project, it is MOST important to:

Options:

A.

obtain the appropriate stakeholders' commitment.


B.

align the project with the IT risk framework.


C.

obtain approval from business process owners.


D.

update the risk register on a regular basis.


Expert Solution
Questions # 11:

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

Options:

A.

Third-party data custodian


B.

Data custodian


C.

Regional office executive


D.

Data owner


Expert Solution
Questions # 12:

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

Options:

A.

Evaluating gaps in the on-premise and cloud security profiles


B.

Establishing minimum cloud security requirements


C.

Enforcing compliance with cloud security parameters


D.

Educating IT staff on variances between on premise and cloud security


Expert Solution
Questions # 13:

Which organizational role should be accountable for ensuring information assets are appropriately classified?

Options:

A.

Data protection officer


B.

Chief information officer (CIO)


C.

Information asset custodian


D.

Information asset owner


Expert Solution
Questions # 14:

Which of the following can be affected by the cost of risk mitigation alternatives?

Options:

A.

Risk appetite


B.

Risk factors


C.

Risk tolerance


D.

Current risk rating


Expert Solution
Questions # 15:

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

Options:

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.


B.

Implement a key performance indicator (KPI) to monitor the existing control performance.


C.

Accept the residual risk in its entirety and obtain executive management approval.


D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.


Expert Solution
Questions # 16:

An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?

Options:

A.

Public relations manager


B.

Data privacy manager


C.

Business manager


D.

Database manager


Expert Solution
Questions # 17:

When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:

Options:

A.

risk map


B.

cause-and-effect diagram


C.

maturity model


D.

technology strategy plan.


Expert Solution
Questions # 18:

Which of the following BEST helps to balance the costs and benefits of managing IT risk?

Options:

A.

Prioritizing risk responses


B.

Evaluating risk based on frequency and probability


C.

Considering risk factors that can be quantified


D.

Managing the risk by using controls


Expert Solution
Questions # 19:

When reviewing a report on the performance of control processes, it is MOST important to verify whether the:

Options:

A.

business process objectives have been met.


B.

control adheres to regulatory standards.


C.

residual risk objectives have been achieved.


D.

control process is designed effectively.


Expert Solution
Questions # 20:

An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?

Options:

A.

Disaster recovery plan (DRP) of the system


B.

Right to audit the provider


C.

Internal controls to ensure data privacy


D.

Transparency of key performance indicators (KPIs)


Expert Solution
Questions # 21:

The risk associated with a high-risk vulnerability in an application is owned by the:

Options:

A.

security department.


B.

business unit


C.

vendor.


D.

IT department.


Expert Solution
Questions # 22:

Optimized risk management is achieved when risk is reduced:

Options:

A.

with strategic initiatives.


B.

to meet risk appetite.


C.

within resource availability.


D.

below risk appetite.


Expert Solution
Questions # 23:

A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Review the most recent vulnerability scanning report.


B.

Determine the business criticality of the asset.


C.

Determine the adequacy of existing security controls.


D.

Review prior security incidents related to the asset.


Expert Solution
Questions # 24:

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

Options:

A.

Implementing risk treatment plans


B.

Validating the status of risk mitigation efforts


C.

Establishing risk policies and standards


D.

Conducting independent reviews of risk assessment results


Expert Solution
Questions # 25:

When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?

Options:

A.

Risk action plans and associated owners


B.

Recent audit and self-assessment results


C.

Potential losses compared to treatment cost


D.

A list of assets exposed to the highest risk


Expert Solution
Questions # 26:

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

Options:

A.

Evaluating risk impact


B.

Establishing key performance indicators (KPIs)


C.

Conducting internal audits


D.

Creating quarterly risk reports


Expert Solution
Questions # 27:

A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?

Options:

A.

Applying risk appetite


B.

Applying risk factors


C.

Referencing risk event data


D.

Understanding risk culture


Expert Solution
Questions # 28:

Which of the following BEST indicates that an organization has implemented IT performance requirements?

Options:

A.

Service level agreements(SLA)


B.

Vendor references


C.

Benchmarking data


D.

Accountability matrix


Expert Solution
Questions # 29:

Which of the following is the BEST indication that key risk indicators (KRls) should be revised?

Options:

A.

A decrease in the number of critical assets covered by risk thresholds


B.

An Increase In the number of risk threshold exceptions


C.

An increase in the number of change events pending management review


D.

A decrease In the number of key performance indicators (KPls)


Expert Solution
Questions # 30:

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

Options:

A.

Key risk indicators (KRls)


B.

Inherent risk


C.

Residual risk


D.

Risk appetite


Expert Solution
Questions # 31:

Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?

Options:

A.

Identification of controls gaps that may lead to noncompliance


B.

Prioritization of risk action plans across departments


C.

Early detection of emerging threats


D.

Accurate measurement of loss impact


Expert Solution
Questions # 32:

Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?

Options:

A.

A comparison of the costs of notice and consent control options


B.

Examples of regulatory fines incurred by industry peers for noncompliance


C.

A report of critical controls showing the importance of notice and consent


D.

A cost-benefit analysis of the control versus probable legal action


Expert Solution
Questions # 33:

Zero Trust architecture is designed and deployed with adherence to which of the following basic tenets?

Options:

A.

Incoming traffic must be inspected before connection is established.


B.

Security frameworks and libraries should be leveraged.


C.

Digital identities should be implemented.


D.

All communication is secured regardless of network location.


Expert Solution
Questions # 34:

Which of the following BEST indicates the efficiency of a process for granting access privileges?

Options:

A.

Average time to grant access privileges


B.

Number of changes in access granted to users


C.

Average number of access privilege exceptions


D.

Number and type of locked obsolete accounts


Expert Solution
Questions # 35:

A PRIMARY advantage of involving business management in evaluating and managing risk is that management:

Options:

A.

better understands the system architecture.


B.

is more objective than risk management.


C.

can balance technical and business risk.


D.

can make better-informed business decisions.


Expert Solution
Questions # 36:

Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:

Options:

A.

accountable for the affected processes.


B.

members of senior management.


C.

authorized to select risk mitigation options.


D.

independent from the business operations.


Expert Solution
Questions # 37:

An upward trend in which of the following metrics should be of MOST concern?

Options:

A.

Number of business change management requests


B.

Number of revisions to security policy


C.

Number of security policy exceptions approved


D.

Number of changes to firewall rules


Expert Solution
Questions # 38:

An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?

Options:

A.

Recommend additional controls to address the risk.


B.

Update the risk tolerance level to acceptable thresholds.


C.

Update the incident-related risk trend in the risk register.


D.

Recommend a root cause analysis of the incidents.


Expert Solution
Questions # 39:

The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

Options:

A.

align with audit results.


B.

benchmark with competitor s actions.


C.

reference best practice.


D.

focus on the business drivers


Expert Solution
Questions # 40:

Which of the following is the BEST indicator of the effectiveness of a control monitoring program?

Options:

A.

Time between control failure and failure detection


B.

Number of key controls as a percentage of total control count


C.

Time spent on internal control assessment reviews


D.

Number of internal control failures within the measurement period


Expert Solution
Questions # 41:

Which of the following is MOST important to consider when developing an organization's risk management strategy?

Options:

A.

Complexity of technology architecture


B.

Disaster recovery strategy


C.

Business operational requirements


D.

Criteria for assessing risk


Expert Solution
Questions # 42:

As part of its risk strategy, an organization decided to transition its financial system from a cloud-based provider to an internally managed system. Which of the following should the risk practitioner do FIRST?

Options:

A.

Reassess whether the risk responses properly address known risks and vulnerabilities


B.

Analyze the risk register to identify potential updates and changes


C.

Evaluate existing control test plans of the system for potential changes


D.

Update the processes within impacted financial control assessments


Expert Solution
Questions # 43:

Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?

Options:

A.

Percentage of legacy servers out of support


B.

Percentage of severs receiving automata patches


C.

Number of unpremeditated vulnerabilities


D.

Number of intrusion attempts


Expert Solution
Questions # 44:

Which of the following is the MOST important reason to revisit a previously accepted risk?

Options:

A.

To update risk ownership


B.

To review the risk acceptance with new stakeholders


C.

To ensure risk levels have not changed


D.

To ensure controls are still operating effectively


Expert Solution
Questions # 45:

Determining if organizational risk is tolerable requires:

Options:

A.

mapping residual risk with cost of controls


B.

comparing against regulatory requirements


C.

comparing industry risk appetite with the organizations.


D.

understanding the organization's risk appetite.


Expert Solution
Questions # 46:

A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?

Options:

A.

Third-party software is used for data analytics.


B.

Data usage exceeds individual consent.


C.

Revenue generated is not disclosed to customers.


D.

Use of a data analytics system is not disclosed to customers.


Expert Solution
Questions # 47:

Which of the following would BEST provide early warning of a high-risk condition?

Options:

A.

Risk register


B.

Risk assessment


C.

Key risk indicator (KRI)


D.

Key performance indicator (KPI)


Expert Solution
Questions # 48:

Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?

Options:

A.

To support decision-making for risk response


B.

To hold risk owners accountable for risk action plans


C.

To secure resourcing for risk treatment efforts


D.

To enable senior management to compile a risk profile


Expert Solution
Questions # 49:

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?

Options:

A.

Percentage of vulnerabilities remediated within the agreed service level


B.

Number of vulnerabilities identified during the period


C.

Number of vulnerabilities re-opened during the period


D.

Percentage of vulnerabilities escalated to senior management


Expert Solution
Questions # 50:

An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?

Options:

A.

IT service desk manager


B.

Sales manager


C.

Customer service manager


D.

Access control manager


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-50 out of questions