Big Halloween Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-50 out of questions
Questions # 1:

A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner's GREATEST concern?

Options:

A.

Security policies are being reviewed infrequently.


B.

Controls are not operating efficiently.


C.

Vulnerabilities are not being mitigated


D.

Aggregate risk is approaching the tolerance threshold


Expert Solution
Questions # 2:

For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?

Options:

A.

Temporarily increase the risk threshold.


B.

Suspend processing to investigate the problem.


C.

Initiate a feasibility study for a new application.


D.

Conduct a root-cause analysis.


Expert Solution
Questions # 3:

Which of the following is BEST measured by key control indicators (KCIs)?

Options:

A.

Historical trends of the organizational risk profile


B.

Cost efficiency of risk treatment plan projects


C.

Comprehensiveness of risk assessment procedures


D.

Effectiveness of organizational defense in depth


Expert Solution
Questions # 4:

An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?

Options:

A.

Organizational strategy


B.

Employee code of conduct


C.

Industry best practices


D.

Organizational policy


Expert Solution
Questions # 5:

Which of the following is MOST useful input when developing risk scenarios?

Options:

A.

Common attacks in other industries.


B.

Identification of risk events.


C.

Impact on critical assets.


D.

Probability of disruptive risk events.


Expert Solution
Questions # 6:

Which of the following BEST supports the management of identified risk scenarios?

Options:

A.

Collecting risk event data


B.

Maintaining a risk register


C.

Using key risk indicators (KRIs)


D.

Defining risk parameters


Expert Solution
Questions # 7:

Who should be responsible for strategic decisions on risk management?

Options:

A.

Chief information officer (CIO)


B.

Executive management team


C.

Audit committee


D.

Business process owner


Expert Solution
Questions # 8:

Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk

awareness program?

Options:

A.

Policies and procedures


B.

Structure and culture


C.

Key risk indicators (KRIs) and thresholds


D.

Known threats and vulnerabilities


Expert Solution
Questions # 9:

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

Options:

A.

Change logs


B.

Change management meeting minutes


C.

Key control indicators (KCIs)


D.

Key risk indicators (KRIs)


Expert Solution
Questions # 10:

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

Options:

A.

Continuous monitoring


B.

A control self-assessment


C.

Transaction logging


D.

Benchmarking against peers


Expert Solution
Questions # 11:

A Software as a Service (SaaS) provider has determined that the risk of a client's sensitive data being compromised is low. Which of the following is the client's BEST course of action?

Options:

A.

Implement additional controls to address the risk


B.

Accept the risk based on the provider's risk assessment


C.

Review the provider's independent audit results


D.

Ensure the contract includes breach notification requirements


Expert Solution
Questions # 12:

Which of the following is the GREATEST risk associated with inappropriate classification of data?

Options:

A.

Inaccurate record management data


B.

Inaccurate recovery time objectives (RTOs)


C.

Lack of accountability for data ownership


D.

Users having unauthorized access to data


Expert Solution
Questions # 13:

A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?

Options:

A.

Customer database manager


B.

Customer data custodian


C.

Data privacy officer


D.

Audit committee


Expert Solution
Questions # 14:

Which of the following is MOST useful when communicating risk to management?

Options:

A.

Risk policy


B.

Audit report


C.

Risk map


D.

Maturity model


Expert Solution
Questions # 15:

Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?

Options:

A.

Relevant risk case studies


B.

Internal audit findings


C.

Risk assessment results


D.

Penetration testing results


Expert Solution
Questions # 16:

Changes in which of the following would MOST likely cause a risk practitioner to adjust the risk impact rating in the risk register?

Options:

A.

Control effectiveness


B.

Risk appetite


C.

Control costs


D.

Risk tolerance


Expert Solution
Questions # 17:

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

Options:

A.

Including trend analysis of risk metrics


B.

Using an aggregated view of organizational risk


C.

Relying on key risk indicator (KRI) data


D.

Ensuring relevance to organizational goals


Expert Solution
Questions # 18:

Which of the following would BEST facilitate the implementation of data classification requirements?

Options:

A.

Assigning a data owner


B.

Implementing technical control over the assets


C.

Implementing a data loss prevention (DLP) solution


D.

Scheduling periodic audits


Expert Solution
Questions # 19:

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

Options:

A.

reduces risk to an acceptable level


B.

quantifies risk impact


C.

aligns with business strategy


D.

advances business objectives.


Expert Solution
Questions # 20:

Which of the following can be interpreted from a single data point on a risk heat map?

Options:

A.

Risk tolerance


B.

Risk magnitude


C.

Risk response


D.

Risk appetite


Expert Solution
Questions # 21:

Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?

Options:

A.

Implement a replacement control.


B.

Adjust residual risk rating.


C.

Escalate to senior management.


D.

Review compensating controls.


Expert Solution
Questions # 22:

An organization's risk profile indicates that residual risk levels have fallen significantly below management's risk appetite. Which of the following is the BEST course of action?

Options:

A.

Decrease monitoring of residual risk levels.


B.

Optimize controls.


C.

Increase risk appetite.


D.

Add more risk scenarios to the risk register.


Expert Solution
Questions # 23:

Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?

Options:

A.

Key risk indicators (KRIs)


B.

Risk governance charter


C.

Organizational risk appetite


D.

Cross-business representation


Expert Solution
Questions # 24:

While reviewing an organization's monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?

Options:

A.

Temporarily suspend emergency changes.


B.

Document the control deficiency in the risk register.


C.

Conduct a root cause analysis.


D.

Continue monitoring change management metrics.


Expert Solution
Questions # 25:

Which of the following is the MOST important document regarding the treatment of sensitive data?

Options:

A.

Encryption policy


B.

Organization risk profile


C.

Digital rights management policy


D.

Information classification policy


Expert Solution
Questions # 26:

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

Options:

A.

risk appetite.


B.

security policies


C.

process maps.


D.

risk tolerance level


Expert Solution
Questions # 27:

An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:

Options:

A.

procedures to monitor the operation of controls.


B.

a tool for monitoring critical activities and controls.


C.

real-time monitoring of risk events and control exceptions.


D.

monitoring activities for all critical assets.


E.

Perform a controls assessment.


Expert Solution
Questions # 28:

Which of the following BEST supports ethical IT risk management practices?

Options:

A.

Robust organizational communication channels


B.

Mapping of key risk indicators (KRIs) to corporate strategy


C.

Capability maturity models integrated with risk management frameworks


D.

Rigorously enforced operational service level agreements (SLAs)


Expert Solution
Questions # 29:

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

Options:

A.

Conduct social engineering testing.


B.

Audit security awareness training materials.


C.

Administer an end-of-training quiz.


D.

Perform a vulnerability assessment.


Expert Solution
Questions # 30:

The BEST indicator of the risk appetite of an organization is the

Options:

A.

regulatory environment of the organization


B.

risk management capability of the organization


C.

board of directors' response to identified risk factors


D.

importance assigned to IT in meeting strategic goals


Expert Solution
Questions # 31:

Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?

Options:

A.

Definition of disaster recovery plan (DRP) scope and key stakeholders


B.

Recovery time and maximum acceptable data loss thresholds


C.

A checklist including equipment, location of data backups, and backup sites


D.

A list of business areas and critical functions subject to risk analysis


Expert Solution
Questions # 32:

What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?

Options:

A.

Seek approval from the control owner.


B.

Update the action plan in the risk register.


C.

Reassess the risk level associated with the new control.


D.

Validate that the control has an established testing method.


Expert Solution
Questions # 33:

An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?

Options:

A.

Acquisition


B.

Implementation


C.

Initiation


D.

Operation and maintenance


Expert Solution
Questions # 34:

When classifying and prioritizing risk responses, the areas to address FIRST are those with:

Options:

A.

low cost effectiveness ratios and high risk levels


B.

high cost effectiveness ratios and low risk levels.


C.

high cost effectiveness ratios and high risk levels


D.

low cost effectiveness ratios and low risk levels.


Expert Solution
Questions # 35:

What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?

Options:

A.

Mitigation and control value


B.

Volume and scope of data generated daily


C.

Business criticality and sensitivity


D.

Recovery point objective (RPO) and recovery time objective (RTO)


Expert Solution
Questions # 36:

Who is responsible for IT security controls that are outsourced to an external service provider?

Options:

A.

Organization's information security manager


B.

Organization's risk function


C.

Service provider's IT management


D.

Service provider's information security manager


Expert Solution
Questions # 37:

Which of the following is MOST important for an organization that wants to reduce IT operational risk?

Options:

A.

Increasing senior management's understanding of IT operations


B.

Increasing the frequency of data backups


C.

Minimizing complexity of IT infrastructure


D.

Decentralizing IT infrastructure


Expert Solution
Questions # 38:

Which of the following is the MOST important benefit of reporting risk assessment results to senior management?

Options:

A.

Promotion of a risk-aware culture


B.

Compilation of a comprehensive risk register


C.

Alignment of business activities


D.

Facilitation of risk-aware decision making


Expert Solution
Questions # 39:

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

Options:

A.

Data controllers


B.

Data processors


C.

Data custodians


D.

Data owners


Expert Solution
Questions # 40:

What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?

Options:

A.

Risk impact


B.

Risk likelihood


C.

Risk appropriate


D.

Control self-assessments (CSAs)


Expert Solution
Questions # 41:

The PRIMARY reason for communicating risk assessment results to data owners is to enable the:

Options:

A.

design of appropriate controls.


B.

industry benchmarking of controls.


C.

prioritization of response efforts.


D.

classification of information assets.


Expert Solution
Questions # 42:

Effective risk communication BEST benefits an organization by:

Options:

A.

helping personnel make better-informed decisions


B.

assisting the development of a risk register.


C.

improving the effectiveness of IT controls.


D.

increasing participation in the risk assessment process.


Expert Solution
Questions # 43:

A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?

Options:

A.

Monitoring of service costs


B.

Provision of internal audit reports


C.

Notification of sub-contracting arrangements


D.

Confidentiality of customer data


Expert Solution
Questions # 44:

Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?

Options:

A.

Aligning risk ownership and control ownership


B.

Developing risk escalation and reporting procedures


C.

Maintaining up-to-date risk treatment plans


D.

Using a consistent method for risk assessment


Expert Solution
Questions # 45:

Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?

Options:

A.

Implement additional controls to further mitigate risk


B.

Review performance results with the control owner


C.

Redefine performance criteria based on control monitoring results


D.

Recommend a tool to meet the performance requirements


Expert Solution
Questions # 46:

To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?

Options:

A.

The risk governance approach of the second and third lines of defense may differ.


B.

The independence of the internal third line of defense may be compromised.


C.

Cost reductions may negatively impact the productivity of other departments.


D.

The new structure is not aligned to the organization's internal control framework.


Expert Solution
Questions # 47:

Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?

Options:

A.

Community cloud


B.

Private cloud


C.

Hybrid cloud


D.

Public cloud


Expert Solution
Questions # 48:

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

Options:

A.

Update firewall configuration


B.

Require strong password complexity


C.

implement a security awareness program


D.

Implement two-factor authentication


Expert Solution
Questions # 49:

Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?

Options:

A.

Loss expectancy information


B.

Control performance predictions


C.

IT service level agreements (SLAs)


D.

Remediation activity progress


Expert Solution
Questions # 50:

Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?

Options:

A.

Risk magnitude


B.

Incident probability


C.

Risk appetite


D.

Cost-benefit analysis


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-50 out of questions