Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 11 out of 11 pages
Viewing questions 501-550 out of questions
Questions # 501:

A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?

Options:

A.

invoke the established incident response plan.


B.

Inform internal audit.


C.

Perform a root cause analysis


D.

Conduct an immediate risk assessment


Expert Solution
Questions # 502:

Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?

Options:

A.

The sum of residual risk levels for each scenario


B.

The loss expectancy for aggregated risk scenarios


C.

The highest loss expectancy among the risk scenarios


D.

The average of anticipated residual risk levels


Expert Solution
Questions # 503:

A change management process has recently been updated with new testing procedures. What is the NEXT course of action?

Options:

A.

Monitor processes to ensure recent updates are being followed.


B.

Communicate to those who test and promote changes.


C.

Conduct a cost-benefit analysis to justify the cost of the control.


D.

Assess the maturity of the change management process.


Expert Solution
Questions # 504:

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

Options:

A.

stakeholder risk tolerance.


B.

benchmarking criteria.


C.

suppliers used by the organization.


D.

the control environment.


Expert Solution
Questions # 505:

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

Options:

A.

Control owner


B.

Risk owner


C.

Internal auditor


D.

Compliance manager


Expert Solution
Questions # 506:

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'

Options:

A.

Identify the regulatory bodies that may highlight this gap


B.

Highlight news articles about data breaches


C.

Evaluate the risk as a measure of probable loss


D.

Verify if competitors comply with a similar policy


Expert Solution
Questions # 507:

The BEST way for management to validate whether risk response activities have been completed is to review:

Options:

A.

the risk register change log.


B.

evidence of risk acceptance.


C.

control effectiveness test results.


D.

control design documentation.


Expert Solution
Questions # 508:

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

Options:

A.

Vulnerability scanning


B.

Systems log correlation analysis


C.

Penetration testing


D.

Monitoring of intrusion detection system (IDS) alerts


Expert Solution
Questions # 509:

Which of the following is MOST useful input when developing risk scenarios?

Options:

A.

Common attacks in other industries.


B.

Identification of risk events.


C.

Impact on critical assets.


D.

Probability of disruptive risk events.


Expert Solution
Questions # 510:

When updating the risk register after a risk assessment, which of the following is MOST important to include?

Options:

A.

Historical losses due to past risk events


B.

Cost to reduce the impact and likelihood


C.

Likelihood and impact of the risk scenario


D.

Actor and threat type of the risk scenario


Expert Solution
Questions # 511:

Which of the following will BEST help an organization select a recovery strategy for critical systems?

Options:

A.

Review the business impact analysis.


B.

Create a business continuity plan.


C.

Analyze previous disaster recovery reports.


D.

Conduct a root cause analysis.


Expert Solution
Questions # 512:

Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?

Options:

A.

Require multi-factor authentication (MFA) to access the digital wallet.


B.

Use a digital key to encrypt the contents of the wallet.


C.

Enable audit logging on the digital wallet's device.


D.

Require public key infrastructure (PKI) to authorize transactions.


Expert Solution
Questions # 513:

A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?

Options:

A.

Align applications to business processes.


B.

Implement an enterprise architecture (EA).


C.

Define the software development life cycle (SDLC).


D.

Define enterprise-wide system procurement requirements.


Expert Solution
Questions # 514:

A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?

Options:

A.

Single sign-on


B.

Audit trail review


C.

Multi-factor authentication


D.

Data encryption at rest


Expert Solution
Questions # 515:

Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?

Options:

A.

Use production data in a non-production environment


B.

Use masked data in a non-production environment


C.

Use test data in a production environment


D.

Use anonymized data in a non-production environment


Expert Solution
Questions # 516:

After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?

Options:

A.

Obtain industry benchmarks related to the specific risk.


B.

Provide justification for the lower risk rating.


C.

Notify the business at the next risk briefing.


D.

Reopen the risk issue and complete a full assessment.


Expert Solution
Questions # 517:

Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?

Options:

A.

Detective control


B.

Deterrent control


C.

Preventive control


D.

Corrective control


Expert Solution
Questions # 518:

Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?

Options:

A.

Updating the organizational policy for remote access


B.

Creating metrics to track remote connections


C.

Implementing multi-factor authentication


D.

Updating remote desktop software


Expert Solution
Questions # 519:

Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?

Options:

A.

Increase in mitigating control costs


B.

Increase in risk event impact


C.

Increase in risk event likelihood


D.

Increase in cybersecurity premium


Expert Solution
Questions # 520:

Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?

Options:

A.

Engaging external risk professionals to periodically review the risk


B.

Prioritizing global standards over local requirements in the risk profile


C.

Updating the risk profile with risk assessment results


D.

Assigning quantitative values to qualitative metrics in the risk register


Expert Solution
Questions # 521:

Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:

Options:

A.

minimize the number of risk scenarios for risk assessment.


B.

aggregate risk scenarios identified across different business units.


C.

build a threat profile of the organization for management review.


D.

provide a current reference to stakeholders for risk-based decisions.


Expert Solution
Questions # 522:

Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?

Options:

A.

Availability of test data


B.

Integrity of data


C.

Cost overruns


D.

System performance


Expert Solution
Questions # 523:

Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?

Options:

A.

Cost-benefit analysis


B.

Risk tolerance


C.

Known vulnerabilities


D.

Cyber insurance


Expert Solution
Viewing page 11 out of 11 pages
Viewing questions 501-550 out of questions