Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 1 out of 12 pages
Viewing questions 1-50 out of questions
Questions # 1:

Which of the following is the PRIMARY objective of engaging key stakeholders in the IT risk assessment process?

Options:

A.

Reducing the time required for risk analysis


B.

Increasing the quality of analysis


C.

Building a risk aware culture


D.

Ensuring proper budget allocation for risk remediation


Expert Solution
Questions # 2:

Which of the following is the BEST approach to resolve a disagreement between stakeholders regarding the impact of a potential risk scenario?

Options:

A.

Modify the risk scenario to address stakeholder concerns.


B.

Calculate the historical impact of risk occurring at industry peers.


C.

Identify data that could be used to help quantify the risk.


D.

Use the highest value of potential impact suggested by the stakeholders.


Expert Solution
Questions # 3:

A risk practitioner is reviewing accountability assignments for data risk in the risk register. Which of the following would pose the GREATEST concern?

Options:

A.

The risk owner is not the control owner for associated data controls.


B.

The risk owner is in a business unit and does not report through the IT department.


C.

The risk owner is listed as the department responsible for decision-making.


D.

The risk owner is a staff member rather than a department manager.


Expert Solution
Questions # 4:

What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?

Options:

A.

Determining possible losses due to downtime during the changes


B.

Updating control procedures and documentation


C.

Approving the proposed changes based on impact analysis


D.

Notifying owners of affected systems after the changes are implemented


Expert Solution
Questions # 5:

In which of the following scenarios would a risk practitioner be required to provide the MOST justification for a risk assessment?

Options:

A.

Modeling a threat-based risk event


B.

Calculating mean time between failures (MTBF)


C.

Using a semi-quantitative approach


D.

Calculating adjusted loss expectancy (ALE)


Expert Solution
Questions # 6:

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

Options:

A.

Risk appetite statement


B.

Enterprise risk management framework


C.

Risk management policies


D.

Risk register


Expert Solution
Questions # 7:

Which of the following should be the MAIN consideration when validating an organization ' s risk appetite?

Options:

A.

Comparison against regulations


B.

Maturity of the risk culture


C.

Capacity to withstand loss


D.

Cost of risk mitigation options


Expert Solution
Questions # 8:

A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization ' s risk:

Options:

A.

management.


B.

tolerance.


C.

culture.


D.

analysis.


Expert Solution
Questions # 9:

Which of the following is a risk practitioner ' s BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

Options:

A.

Enroll the employee in additional security training.


B.

Invoke the incident response plan.


C.

Conduct an internal audit.


D.

Instruct the vendor to delete the data.


Expert Solution
Questions # 10:

A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?

Options:

A.

Risk assessment


B.

Risk reporting


C.

Risk mitigation


D.

Risk identification


Expert Solution
Questions # 11:

All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:

Options:

A.

select a provider to standardize the disaster recovery plans.


B.

outsource disaster recovery to an external provider.


C.

centralize the risk response function at the enterprise level.


D.

evaluate opportunities to combine disaster recovery plans.


Expert Solution
Questions # 12:

Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?

Options:

A.

Communicating risk awareness materials regularly


B.

Establishing key risk indicators (KRIs) to monitor risk management processes


C.

Ensuring that business activities minimize inherent risk


D.

Embedding risk management in business activities


Expert Solution
Questions # 13:

Which of the following is the BEST method of creating risk awareness in an organization?

Options:

A.

Marking the risk register available to project stakeholders


B.

Ensuring senior management commitment to risk training


C.

Providing regular communication to risk managers


D.

Appointing the risk manager from the business units


Expert Solution
Questions # 14:

Which of the following is the MOST important information to be communicated during security awareness training?

Options:

A.

Management ' s expectations


B.

Corporate risk profile


C.

Recent security incidents


D.

The current risk management capability


Expert Solution
Questions # 15:

During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?

Options:

A.

Report the infraction.


B.

Perform a risk assessment.


C.

Conduct risk awareness training.


D.

Discontinue the process.


Expert Solution
Questions # 16:

Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?

Options:

A.

Scalable infrastructure


B.

A hot backup site


C.

Transaction limits


D.

Website activity monitoring


Expert Solution
Questions # 17:

Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?

Options:

A.

Corrective


B.

Preventive


C.

Detective


D.

Deterrent


Expert Solution
Questions # 18:

An organization ' s IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner ' s BEST recommendation?

Options:

A.

Accept the risk of using the production data to ensure accurate results.


B.

Assess the risk of using production data for testing before making a decision.


C.

Benchmark against what peer organizations are doing with POC testing environments.


D.

Deny the request, as production data should not be used for testing purposes.


Expert Solution
Questions # 19:

Which of the following controls BEST addresses the risk of unauthorized disclosure of sensitive data as a result of a lost bring your own device (BYOD) tablet?

Options:

A.

Unregistered device detection


B.

Device encryption


C.

Device wiping policy


D.

Mobile device antivirus


Expert Solution
Questions # 20:

Which of the following changes would be reflected in an organization ' s risk profile after the failure of a critical patch implementation?

Options:

A.

Risk tolerance is decreased.


B.

Residual risk is increased.


C.

Inherent risk is increased.


D.

Risk appetite is decreased


Expert Solution
Questions # 21:

Which of the following is MOST important for an organization to have in place when developing a risk management framework?

Options:

A.

A strategic approach to risk including an established risk appetite


B.

A risk-based internal audit plan for the organization


C.

A control function within the risk management team


D.

An organization-wide risk awareness training program


Expert Solution
Questions # 22:

An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?

Options:

A.

Data retention requirements


B.

Data destruction requirements


C.

Cloud storage architecture


D.

Key management


Expert Solution
Questions # 23:

An organization is making significant changes to an application. At what point should the application risk profile be updated?

Options:

A.

After user acceptance testing (UAT)


B.

Upon release to production


C.

During backlog scheduling


D.

When reviewing functional requirements


Expert Solution
Questions # 24:

The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:

Options:

A.

results of a business impact analysis (BIA).


B.

the original risk response plan.


C.

training program and user awareness documentation.


D.

a post-implementation risk and control self-assessment (RCSA).


Expert Solution
Questions # 25:

Reviewing which of the following BEST helps an organization gam insight into its overall risk profile ' '

Options:

A.

Risk register


B.

Risk appetite


C.

Threat landscape


D.

Risk metrics


Expert Solution
Questions # 26:

The PRIMARY objective for requiring an independent review of an organization ' s IT risk management process should be to:

Options:

A.

assess gaps in IT risk management operations and strategic focus.


B.

confirm that IT risk assessment results are expressed as business impact.


C.

verify implemented controls to reduce the likelihood of threat materialization.


D.

ensure IT risk management is focused on mitigating potential risk.


Expert Solution
Questions # 27:

The PRIMARY benefit of using a maturity model is that it helps to evaluate the:

Options:

A.

capability to implement new processes


B.

evolution of process improvements


C.

degree of compliance with policies and procedures


D.

control requirements.


Expert Solution
Questions # 28:

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

Options:

A.

update the risk rating.


B.

reevaluate inherent risk.


C.

develop new risk scenarios.


D.

implement additional controls.


Expert Solution
Questions # 29:

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r

Options:

A.

Prepare a business case for the response options.


B.

Identify resources for implementing responses.


C.

Develop a mechanism for monitoring residual risk.


D.

Update the risk register with the results.


Expert Solution
Questions # 30:

Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?

Options:

A.

Cost-benefit analysis


B.

Penetration testing


C.

Business impact analysis (BIA)


D.

Security assessment


Expert Solution
Questions # 31:

A PRIMARY advantage of involving business management in evaluating and managing risk is that management:

Options:

A.

better understands the system architecture.


B.

is more objective than risk management.


C.

can balance technical and business risk.


D.

can make better-informed business decisions.


Expert Solution
Questions # 32:

Which of the following is the MOST important consideration when developing an organization ' s risk taxonomy?

Options:

A.

Leading industry frameworks


B.

Business context


C.

Regulatory requirements


D.

IT strategy


Expert Solution
Questions # 33:

Which of the following should be considered when selecting a risk response?

Options:

A.

Risk scenarios analysis


B.

Risk response costs


C.

Risk factor awareness


D.

Risk factor identification


Expert Solution
Questions # 34:

Which of the following should be the PRIMARY consideration when prioritizing limited resources needed to implement overdue corrective actions arising from a recent internal audit?

Options:

A.

Level of risk impact


B.

Cost-benefit analysis


C.

Key control indicator (KCI) measures


D.

Availability of other technical controls


Expert Solution
Questions # 35:

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

Options:

A.

Periodic user privileges review


B.

Log monitoring


C.

Periodic internal audits


D.

Segregation of duties


Expert Solution
Questions # 36:

An updated report from a trusted research organization shows that attacks have increased in the organization ' s industry segment. What should be done FIRST to integrate this data into risk assessments?

Options:

A.

Average the ransomware attack frequencies together


B.

Revise the threat frequency for ransomware attack types


C.

Adjust impact amounts based on the average ransom


D.

Use the new frequency as the maximum value in a Monte Carlo simulation


Expert Solution
Questions # 37:

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

Options:

A.

A privacy impact assessment has not been completed.


B.

Data encryption methods apply to a subset of Pll obtained.


C.

The data privacy officer was not consulted.


D.

Insufficient access controls are used on the loT devices.


Expert Solution
Questions # 38:

Which of the following enterprise architecture (EA) controls BEST mitigates the risk of increasingly complex systems becoming compromised by unauthorized network access?

Options:

A.

Requirements to change default settings on network devices


B.

Continuous network vulnerability scanning and remediation


C.

Complex password policy and procedures


D.

Continuous access verification and authentication


Expert Solution
Questions # 39:

Which of the following is the MOST important responsibility of a business process owner to enable effective IT risk management?

Options:

A.

Delivering risk reports in a timely manner


B.

Escalating risk to senior management


C.

Prioritizing risk for appropriate response


D.

Collecting and analyzing risk data


Expert Solution
Questions # 40:

An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:

Options:

A.

risk mitigation.


B.

risk evaluation.


C.

risk appetite.


D.

risk tolerance.


Expert Solution
Questions # 41:

An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?

Options:

A.

Periodically review application on BYOD devices


B.

Include BYOD in organizational awareness programs


C.

Implement BYOD mobile device management (MDM) controls.


D.

Enable a remote wee capability for BYOD devices


Expert Solution
Questions # 42:

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization ' s risk appetite?

Options:

A.

Developing contingency plans for key processes


B.

Implementing key performance indicators (KPIs)


C.

Adding risk triggers to entries in the risk register


D.

Establishing a series of key risk indicators (KRIs)


Expert Solution
Questions # 43:

A MAJOR advantage of using key risk indicators (KRIs) is that they:

Options:

A.

Identify scenarios that exceed defined risk appetite.


B.

Help with internal control assessments concerning risk appetite.


C.

Assess risk scenarios that exceed defined thresholds.


D.

Identify when risk exceeds defined thresholds.


Expert Solution
Questions # 44:

Which of the following should be determined FIRST when a new security vulnerability is made public?

Options:

A.

How severe the vulnerability is across the industry


B.

Whether the affected technology is internet-facing


C.

Whether the affected technology is used within the organization


D.

What mitigating controls are currently in place


Expert Solution
Questions # 45:

When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

Options:

A.

Reliance on qualitative analysis methods.


B.

Lack of a governance, risk, and compliance (GRC) tool.


C.

Lack of senior management involvement.


D.

Use of multiple risk registers.


Expert Solution
Questions # 46:

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

Options:

A.

Replace the action owner with a more experienced individual.


B.

Implement compensating controls until the preferred action can be completed.


C.

Change the risk response strategy of the relevant risk to risk avoidance.


D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.


Expert Solution
Questions # 47:

Which of the following is a risk practitioner ' s MOST important course of action after learning that an organization ' s industry peers have experienced an increase in ransomware attacks?

Options:

A.

Recommend additional preventive controls to reduce residual risk.


B.

Document this scenario as a risk event for further risk analysis.


C.

Propose risk acceptance until the organization is directly affected.


D.

Raise a security incident to proactively prevent similar attacks.


Expert Solution
Questions # 48:

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

Options:

A.

Performing a benchmark analysis and evaluating gaps


B.

Conducting risk assessments and implementing controls


C.

Communicating components of risk and their acceptable levels


D.

Participating in peer reviews and implementing best practices


Expert Solution
Questions # 49:

In order to determining a risk is under-controlled the risk practitioner will need to

Options:

A.

understand the risk tolerance


B.

monitor and evaluate IT performance


C.

identify risk management best practices


D.

determine the sufficiency of the IT risk budget


Expert Solution
Questions # 50:

Which of the following is MOST effective in continuous risk management process improvement?

Options:

A.

Periodic assessments


B.

Change management


C.

Awareness training


D.

Policy updates


Expert Solution
Viewing page 1 out of 12 pages
Viewing questions 1-50 out of questions