Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-50 out of questions
Questions # 1:

What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?

Options:

A.

Documenting project lessons learned


B.

Validating the risk mitigation project has been completed


C.

Confirming that the project budget was not exceeded


D.

Verifying that the risk level has been lowered


Expert Solution
Questions # 2:

An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?

Options:

A.

Perform a cost-benefit analysis.


B.

Conduct a SWOT analysis.


C.

Provide data on the number of risk events from the last year.


D.

Report on recent losses experienced by industry peers.


Expert Solution
Questions # 3:

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?

Options:

A.

Develop new loT risk scenarios.


B.

Implement loT device monitoring software.


C.

Introduce controls to the new threat environment.


D.

Engage external security reviews.


Expert Solution
Questions # 4:

Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?

Options:

A.

Transfer the risk.


B.

Perform a gap analysis.


C.

Determine risk appetite for the new regulation.


D.

Implement specific monitoring controls.


Expert Solution
Questions # 5:

An organization is making significant changes to an application. At what point should the application risk profile be updated?

Options:

A.

After user acceptance testing (UAT)


B.

Upon release to production


C.

During backlog scheduling


D.

When reviewing functional requirements


Expert Solution
Questions # 6:

Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?

Options:

A.

Risk policy review


B.

Business impact analysis (B1A)


C.

Control catalog


D.

Risk register


Expert Solution
Questions # 7:

Which of the following is the BEST method to track asset inventory?

Options:

A.

Periodic asset review by management


B.

Asset registration form


C.

Automated asset management software


D.

IT resource budgeting process


Expert Solution
Questions # 8:

Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?

Options:

A.

IT security manager


B.

IT personnel


C.

Data custodian


D.

Data owner


Expert Solution
Questions # 9:

Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?

Options:

A.

Control owner


B.

Risk manager


C.

Control operator


D.

Risk treatment owner


Expert Solution
Questions # 10:

Which of the following tools is MOST effective in identifying trends in the IT risk profile?

Options:

A.

Risk self-assessment


B.

Risk register


C.

Risk dashboard


D.

Risk map


Expert Solution
Questions # 11:

In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?

Options:

A.

Establishing an intellectual property agreement


B.

Evaluating each of the data sources for vulnerabilities


C.

Periodically reviewing big data strategies


D.

Benchmarking to industry best practice


Expert Solution
Questions # 12:

During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:

Options:

A.

reset the alert threshold based on peak traffic


B.

analyze the traffic to minimize the false negatives


C.

analyze the alerts to minimize the false positives


D.

sniff the traffic using a network analyzer


Expert Solution
Questions # 13:

An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?

Options:

A.

Chief information security officer


B.

Business process owner


C.

Chief risk officer


D.

IT controls manager


Expert Solution
Questions # 14:

The BEST reason to classify IT assets during a risk assessment is to determine the:

Options:

A.

priority in the risk register.


B.

business process owner.


C.

enterprise risk profile.


D.

appropriate level of protection.


Expert Solution
Questions # 15:

Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?

Options:

A.

Apply available security patches.


B.

Schedule a penetration test.


C.

Conduct a business impact analysis (BIA)


D.

Perform a vulnerability analysis.


Expert Solution
Questions # 16:

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

Options:

A.

requirements of management.


B.

specific risk analysis framework being used.


C.

organizational risk tolerance


D.

results of the risk assessment.


Expert Solution
Questions # 17:

The MOST important reason to monitor key risk indicators (KRIs) is to help management:

Options:

A.

identity early risk transfer strategies.


B.

lessen the impact of realized risk.


C.

analyze the chain of risk events.


D.

identify the root cause of risk events.


Expert Solution
Questions # 18:

Which of the following conditions presents the GREATEST risk to an application?

Options:

A.

Application controls are manual.


B.

Application development is outsourced.


C.

Source code is escrowed.


D.

Developers have access to production environment.


Expert Solution
Questions # 19:

A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?

Options:

A.

Negotiating terms of adoption


B.

Understanding the timeframe to implement


C.

Completing a gap analysis


D.

Initiating the conversion


Expert Solution
Questions # 20:

Who should be responsible for approving the cost of controls to be implemented for mitigating risk?

Options:

A.

Risk practitioner


B.

Risk owner


C.

Control owner


D.

Control implementer


Expert Solution
Questions # 21:

Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?

Options:

A.

Hosted data


B.

Platforms


C.

Containers


D.

Security logs


Expert Solution
Questions # 22:

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

Options:

A.

Including trend analysis of risk metrics


B.

Using an aggregated view of organizational risk


C.

Relying on key risk indicator (KRI) data


D.

Ensuring relevance to organizational goals


Expert Solution
Questions # 23:

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

Options:

A.

ensuring controls are operating efficiently and facilitating productivity.


B.

enabling senior leadership to better understand the level of risk the organization is facing.


C.

monitoring changes in the likelihood of adverse events due to ineffective controls.


D.

providing information on the degree to which controls are meeting intended objectives.


Expert Solution
Questions # 24:

Which of the following should be the PRIMARY input when designing IT controls?

Options:

A.

Benchmark of industry standards


B.

Internal and external risk reports


C.

Recommendations from IT risk experts


D.

Outcome of control self-assessments


Expert Solution
Questions # 25:

Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?

Options:

A.

Introducing control procedures early in the life cycle


B.

Implementing loT device software monitoring


C.

Performing periodic risk assessments of loT


D.

Performing secure code reviews


Expert Solution
Questions # 26:

Which of the following is the BEST way to maintain a current list of organizational risk scenarios?

Options:

A.

Automate workflow for risk status updates.


B.

Perform regular reviews of key controls.


C.

Conduct periodic risk reviews with stakeholders.


D.

Conduct compliance reviews.


Expert Solution
Questions # 27:

Which of the following presents the GREATEST concern associated with the

use of artificial intelligence (Al) systems?

Options:

A.

Al systems need to be available continuously.


B.

Al systems can be affected by bias.


C.

Al systems are expensive to maintain.


D.

Al systems can provide false positives.


Expert Solution
Questions # 28:

When evaluating enterprise IT risk management it is MOST important to:

Options:

A.

create new control processes to reduce identified IT risk scenarios


B.

confirm the organization’s risk appetite and tolerance


C.

report identified IT risk scenarios to senior management


D.

review alignment with the organization's investment plan


Expert Solution
Questions # 29:
Options:

A.

Risk tolerance


B.

Risk velocity


C.

Risk appetite


D.

Risk capacity


Expert Solution
Questions # 30:

Which of the following controls BEST helps to ensure that transaction data reaches its destination?

Options:

A.

Securing the network from attacks


B.

Providing acknowledgments from receiver to sender


C.

Digitally signing individual messages


D.

Encrypting data-in-transit


Expert Solution
Questions # 31:

Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?

Options:

A.

User authorization


B.

User recertification


C.

Change log review


D.

Access log monitoring


Expert Solution
Questions # 32:

During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?

Options:

A.

Implement continuous monitoring.


B.

Require a second level of approval.


C.

Implement separation of duties.


D.

Require a code of ethics.


Expert Solution
Questions # 33:

During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?

Options:

A.

Review the cost-benefit of mitigating controls


B.

Mark the risk status as unresolved within the risk register


C.

Verify the sufficiency of mitigating controls with the risk owner


D.

Update the risk register with implemented mitigating actions


Expert Solution
Questions # 34:

An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?

Options:

A.

Secure encryption protocols are utilized.


B.

Multi-factor authentication is set up for users.


C.

The solution architecture is approved by IT.


D.

A risk transfer clause is included in the contact


Expert Solution
Questions # 35:

A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?

Options:

A.

Protect sensitive information with access controls.


B.

Implement a data loss prevention (DLP) solution.


C.

Re-communicate the data protection policy.


D.

Implement a data encryption solution.


Expert Solution
Questions # 36:

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

Options:

A.

Failure to test the disaster recovery plan (DRP)


B.

Lack of well-documented business impact analysis (BIA)


C.

Lack of annual updates to the disaster recovery plan (DRP)


D.

Significant changes in management personnel


Expert Solution
Questions # 37:

Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?

Options:

A.

Cost of implementation


B.

Implementation of unproven applications


C.

Disruption to business processes


D.

Increase in attack surface area


Expert Solution
Questions # 38:

Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?

Options:

A.

Well documented policies and procedures


B.

Risk and issue tracking


C.

An IT strategy committee


D.

Change and release management


Expert Solution
Questions # 39:

Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?

Options:

A.

Transferring the risk


B.

Introducing control procedures early in the life cycle


C.

Updating the risk tolerance to include the new risk


D.

Implementing IoT device monitoring software


Expert Solution
Questions # 40:

Which of the following is the STRONGEST indication an organization has ethics management issues?

Options:

A.

Employees do not report IT risk issues for fear of consequences.


B.

Internal IT auditors report to the chief information security officer (CISO).


C.

Employees face sanctions for not signing the organization's acceptable use policy.


D.

The organization has only two lines of defense.


Expert Solution
Questions # 41:

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

Options:

A.

update the risk rating.


B.

reevaluate inherent risk.


C.

develop new risk scenarios.


D.

implement additional controls.


Expert Solution
Questions # 42:

Which of the following is MOST important to add to the risk register for a remediated risk scenario?

Options:

A.

Notification to technical teams of implementation schedules


B.

Sign-off by senior executives


C.

Evidence of successfully implemented controls


D.

Minutes from control design meetings


Expert Solution
Questions # 43:

Changes in which of the following would MOST likely cause a risk practitioner to adjust the risk impact rating in the risk register?

Options:

A.

Control effectiveness


B.

Risk appetite


C.

Control costs


D.

Risk tolerance


Expert Solution
Questions # 44:

Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?

Options:

A.

User access may be restricted by additional security.


B.

Unauthorized access may be gained to multiple systems.


C.

Security administration may become more complex.


D.

User privilege changes may not be recorded.


Expert Solution
Questions # 45:

An effective control environment is BEST indicated by controls that:

Options:

A.

minimize senior management's risk tolerance.


B.

manage risk within the organization's risk appetite.


C.

reduce the thresholds of key risk indicators (KRIs).


D.

are cost-effective to implement


Expert Solution
Questions # 46:

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?

Options:

A.

Monitor the databases for abnormal activity


B.

Approve exception to allow the software to continue operating


C.

Require the software vendor to remediate the vulnerabilities


D.

Accept the risk and let the vendor run the software as is


Expert Solution
Questions # 47:

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

Options:

A.

Risk exposure expressed in business terms


B.

Recommendations for risk response options


C.

Resource requirements for risk responses


D.

List of business areas affected by the risk


Expert Solution
Questions # 48:

An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?

Options:

A.

Map the granular risk scenarios to the high-level risk register items.


B.

List application and server vulnerabilities in the IT risk register.


C.

Identify overlapping risk scenarios between the two registers.


D.

Maintain both high-level and granular risk scenarios in a single register.


Expert Solution
Questions # 49:

The PRIMARY purpose of using a framework for risk analysis is to:

Options:

A.

improve accountability


B.

improve consistency


C.

help define risk tolerance


D.

help develop risk scenarios.


Expert Solution
Questions # 50:

When developing IT risk scenarios, it is MOST important to consider:

Options:

A.

The industry's threat profile.


B.

Incidents occurring at similar organizations.


C.

System performance thresholds.


D.

Organizational objectives.


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-50 out of questions