Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 2 out of 12 pages
Viewing questions 51-100 out of questions
Questions # 51:

Which of the following statements BEST describes risk appetite?

Options:

A.

The amount of risk an organization is willing to accept


B.

The effective management of risk and internal control environments


C.

Acceptable variation between risk thresholds and business objectives


D.

The acceptable variation relative to the achievement of objectives


Expert Solution
Questions # 52:

Which of the following should be management ' s PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?

Options:

A.

Designing compensating controls


B.

Determining if KRIs have been updated recently


C.

Assessing the effectiveness of the incident response plan


D.

Determining what has changed in the environment


Expert Solution
Questions # 53:

Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?

Options:

A.

Risk taxonomy


B.

Risk response


C.

Risk appetite


D.

Risk ranking


Expert Solution
Questions # 54:

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

Options:

A.

increased inherent risk.


B.

higher risk management cost


C.

decreased residual risk.


D.

lower risk management cost.


Expert Solution
Questions # 55:

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

Options:

A.

risk appetite.


B.

security policies


C.

process maps.


D.

risk tolerance level


Expert Solution
Questions # 56:

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

Options:

A.

Including trend analysis of risk metrics


B.

Using an aggregated view of organizational risk


C.

Relying on key risk indicator (KRI) data


D.

Ensuring relevance to organizational goals


Expert Solution
Questions # 57:

Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?

Options:

A.

Reassessing control effectiveness of the process


B.

Conducting a post-implementation review to determine lessons learned


C.

Reporting key performance indicators (KPIs) for core processes


D.

Establishing escalation procedures for anomaly events


Expert Solution
Questions # 58:

Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?

Options:

A.

Number of times the recovery plan is reviewed


B.

Number of successful recovery plan tests


C.

Percentage of systems with outdated virus protection


D.

Percentage of employees who can work remotely


Expert Solution
Questions # 59:

Which of the following scenarios represents a threat?

Options:

A.

Connecting a laptop to a free, open, wireless access point (hotspot)


B.

Visitors not signing in as per policy


C.

Storing corporate data in unencrypted form on a laptop


D.

A virus transmitted on a USB thumb drive


Expert Solution
Questions # 60:

Which of the following should be a risk practitioner ' s PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

Options:

A.

Data duplication processes


B.

Data archival processes


C.

Data anonymization processes


D.

Data protection processes


Expert Solution
Questions # 61:

A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?

Options:

A.

Reviewing access control lists


B.

Authorizing user access requests


C.

Performing user access recertification


D.

Terminating inactive user access


Expert Solution
Questions # 62:

Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

Options:

A.

An updated risk register


B.

Risk assessment results


C.

Technical control validation


D.

Control testing results


Expert Solution
Questions # 63:

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization ' s network?

Options:

A.

Network monitoring infrastructure


B.

Centralized vulnerability management


C.

Incident management process


D.

Centralized log management


Expert Solution
Questions # 64:

An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?

Options:

A.

Disaster recovery plan (DRP) of the system


B.

Right to audit the provider


C.

Internal controls to ensure data privacy


D.

Transparency of key performance indicators (KPIs)


Expert Solution
Questions # 65:

In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner ' s BEST recommendation to further reduce the impact of ransomware attacks would be to implement:

Options:

A.

two-factor authentication.


B.

continuous data backup controls.


C.

encryption for data at rest.


D.

encryption for data in motion.


Expert Solution
Questions # 66:

A control owner identifies that the organization ' s shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?

Options:

A.

Protect sensitive information with access controls.


B.

Implement a data loss prevention (DLP) solution.


C.

Re-communicate the data protection policy.


D.

Implement a data encryption solution.


Expert Solution
Questions # 67:

Which of the following provides the MOST helpful information in identifying risk in an organization?

Options:

A.

Risk registers


B.

Risk analysis


C.

Risk scenarios


D.

Risk responses


Expert Solution
Questions # 68:

A multinational organization is considering implementing standard background checks to ' all new employees A KEY concern regarding this approach

Options:

A.

fail to identity all relevant issues.


B.

be too costly


C.

violate laws in other countries


D.

be too line consuming


Expert Solution
Questions # 69:

Which of the following would be a risk practitioner ' s MOST important action upon learning that an IT control has failed?

Options:

A.

Implement a replacement control.


B.

Adjust residual risk rating.


C.

Escalate to senior management.


D.

Review compensating controls.


Expert Solution
Questions # 70:

Which of the following metrics is BEST used to communicate to senior management that the control environment manages risk within appetite and tolerance?

Options:

A.

Number of security incidents


B.

Reduction in control expenditures


C.

Number of risk responses executed


D.

Reduction in residual risk


Expert Solution
Questions # 71:

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

Options:

A.

The difference In the management practices between each company


B.

The cloud computing environment is shared with another company


C.

The lack of a service level agreement (SLA) in the vendor contract


D.

The organizational culture differences between each country


Expert Solution
Questions # 72:

Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?

Options:

A.

Establish a cyber response plan


B.

Implement data loss prevention (DLP) tools.


C.

Implement network segregation.


D.

Strengthen vulnerability remediation efforts.


Expert Solution
Questions # 73:

Which of the following is the BEST metric to demonstrate the effectiveness of an organization ' s change management process?

Options:

A.

Increase in the frequency of changes


B.

Percent of unauthorized changes


C.

Increase in the number of emergency changes


D.

Average time to complete changes


Expert Solution
Questions # 74:

Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?

Options:

A.

Lack of access verification for systems on the internal network


B.

Identification and authentication failures for users


C.

Poorly configured firewall rules introducing security breaches


D.

Ineffective load balancing on network devices


Expert Solution
Questions # 75:

Which of the following is the BEST way to ensure ongoing control effectiveness?

Options:

A.

Establishing policies and procedures


B.

Periodically reviewing control design


C.

Measuring trends in control performance


D.

Obtaining management control attestations


Expert Solution
Questions # 76:

Which of the following is a risk practitioner ' s MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

Options:

A.

Verify authorization by senior management.


B.

Increase the risk appetite to align with the current risk level


C.

Ensure the acceptance is set to expire over lime


D.

Update the risk response in the risk register.


Expert Solution
Questions # 77:

Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s software testing program?

Options:

A.

Average time to complete software test cases


B.

Percentage of applications with defined business cases


C.

Number of incidents resulting from software changes


D.

Percentage of staff completing software development training


Expert Solution
Questions # 78:

The BEST way for management to validate whether risk response activities have been completed is to review:

Options:

A.

the risk register change log.


B.

evidence of risk acceptance.


C.

control effectiveness test results.


D.

control design documentation.


Expert Solution
Questions # 79:

Which of the following is the PRIMARY reason for managing emerging risk?

Options:

A.

The organization is likely to become prone to continuous disruptive events.


B.

Risk assessment methodologies cannot be applied to emerging risk.


C.

Assumptions about the future state are likely to become invalid.


D.

The number of risk scenarios may become uncontrollably high.


Expert Solution
Questions # 80:

Which of the following is MOST critical when designing controls?

Options:

A.

Involvement of internal audit


B.

Involvement of process owner


C.

Quantitative impact of the risk


D.

Identification of key risk indicators


Expert Solution
Questions # 81:

An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?

Options:

A.

Variances in recovery times


B.

Ownership assignment for controls


C.

New potentially disruptive scenarios


D.

Contractual changes with customers


Expert Solution
Questions # 82:

An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?

Options:

A.

Detective


B.

Deterrent


C.

Preventive


D.

Corrective


Expert Solution
Questions # 83:

Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?

Options:

A.

Risk mitigation plans


B.

heat map


C.

Risk appetite statement


D.

Key risk indicators (KRls)


Expert Solution
Questions # 84:

Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?

Options:

A.

To have a unified approach to risk management across the organization


B.

To have a standard risk management process for complying with regulations


C.

To optimize risk management resources across the organization


D.

To ensure risk profiles are presented in a consistent format within the organization


Expert Solution
Questions # 85:

An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?

Options:

A.

Accept the risk and document contingency plans for data disruption.


B.

Remove the associated risk scenario from the risk register due to avoidance.


C.

Mitigate the risk with compensating controls enforced by the third-party cloud provider.


D.

Validate the transfer of risk and update the register to reflect the change.


Expert Solution
Questions # 86:

Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?

Options:

A.

Threat to IT


B.

Number of control failures


C.

Impact on business


D.

Risk ownership


Expert Solution
Questions # 87:

Which of the following will MOST improve stakeholders ' understanding of the effect of a potential threat?

Options:

A.

Establishing a risk management committee


B.

Updating the organization ' s risk register to reflect the new threat


C.

Communicating the results of the threat impact analysis


D.

Establishing metrics to assess the effectiveness of the responses


Expert Solution
Questions # 88:

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

Options:

A.

Methods of attack progression


B.

Losses incurred by industry peers


C.

Most recent antivirus scan reports


D.

Potential impact of events


Expert Solution
Questions # 89:

Which of the following would BEST provide early warning of a high-risk condition?

Options:

A.

Risk register


B.

Risk assessment


C.

Key risk indicator (KRI)


D.

Key performance indicator (KPI)


Expert Solution
Questions # 90:

Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?

Options:

A.

Number of tickets for provisioning new accounts


B.

Average time to provision user accounts


C.

Password reset volume per month


D.

Average account lockout time


Expert Solution
Questions # 91:

Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?

Options:

A.

Software version


B.

Assigned software manager


C.

Software support contract expiration


D.

Software licensing information


Expert Solution
Questions # 92:

Within the three lines of defense model, the accountability for the system of internal control resides with:

Options:

A.

the chief information officer (CIO).


B.

the board of directors


C.

enterprise risk management


D.

the risk practitioner


Expert Solution
Questions # 93:

Which of the following will BEST help to ensure that information system controls are effective?

Options:

A.

Responding promptly to control exceptions


B.

Implementing compensating controls


C.

Testing controls periodically


D.

Automating manual controls


Expert Solution
Questions # 94:

A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner ' s BEST course of action?

Options:

A.

Review the most recent vulnerability scanning report.


B.

Determine the business criticality of the asset.


C.

Determine the adequacy of existing security controls.


D.

Review prior security incidents related to the asset.


Expert Solution
Questions # 95:

Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization ' s IT systems via personal or public computers?

Options:

A.

Risk appetite


B.

Inherent risk


C.

Key risk indicator (KRI)


D.

Risk tolerance


Expert Solution
Questions # 96:

Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?

Options:

A.

Business case


B.

Balanced scorecard


C.

Industry standards


D.

Heat map


Expert Solution
Questions # 97:

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

Options:

A.

Percentage of IT assets with current malware definitions


B.

Number of false positives defected over a period of time


C.

Number of alerts generated by the anti-virus software


D.

Frequency of anti-vinjs software updates


Expert Solution
Questions # 98:

The PRIMARY purpose of using a framework for risk analysis is to:

Options:

A.

improve accountability


B.

improve consistency


C.

help define risk tolerance


D.

help develop risk scenarios.


Expert Solution
Questions # 99:

Which of the following is MOST important for maintaining the effectiveness of an IT risk register?

Options:

A.

Removing entries from the register after the risk has been treated


B.

Recording and tracking the status of risk response plans within the register


C.

Communicating the register to key stakeholders


D.

Performing regular reviews and updates to the register


Expert Solution
Questions # 100:

Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?

Options:

A.

Reviewing the organization ' s policies and procedures


B.

Interviewing groups of key stakeholders


C.

Circulating questionnaires to key internal stakeholders


D.

Accepting IT personnel s view of business issues


Expert Solution
Viewing page 2 out of 12 pages
Viewing questions 51-100 out of questions