Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 2 out of 11 pages
Viewing questions 51-100 out of questions
Questions # 51:

After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to

Options:

A.

recommend a program that minimizes the concerns of that production system.


B.

inform the process owner of the concerns and propose measures to reduce them.


C.

inform the IT manager of the concerns and propose measures to reduce them.


D.

inform the development team of the concerns and together formulate risk reduction measures.


Expert Solution
Questions # 52:

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?

Options:

A.

Collaborate with the risk owner to determine the risk response plan.


B.

Document the gap in the risk register and report to senior management.


C.

Include a right to audit clause in the service provider contract.


D.

Advise the risk owner to accept the risk.


Expert Solution
Questions # 53:

The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:

Options:

A.

inconsistencies between security policies and procedures


B.

possible noncompliant activities that lead to data disclosure


C.

leading or lagging key risk indicators (KRIs)


D.

unknown threats to undermine existing access controls


Expert Solution
Questions # 54:

Which of the following should be the GREATEST concern for an organization that uses open source software applications?

Options:

A.

Lack of organizational policy regarding open source software


B.

Lack of reliability associated with the use of open source software


C.

Lack of monitoring over installation of open source software in the organization


D.

Lack of professional support for open source software


Expert Solution
Questions # 55:

Which of the following is the MOST important data attribute of key risk indicators (KRIs)?

Options:

A.

The data is measurable.


B.

The data is calculated continuously.


C.

The data is relevant.


D.

The data is automatically produced.


Expert Solution
Questions # 56:

Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?

Options:

A.

The outsourcing of related IT processes


B.

Outcomes of periodic risk assessments


C.

Changes in service level objectives


D.

Findings from continuous monitoring


Expert Solution
Questions # 57:

Which of the following BEST reduces the probability of laptop theft?

Options:

A.

Cable lock


B.

Acceptable use policy


C.

Data encryption


D.

Asset tag with GPS


Expert Solution
Questions # 58:

When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

Options:

A.

Reliance on qualitative analysis methods.


B.

Lack of a governance, risk, and compliance (GRC) tool.


C.

Lack of senior management involvement.


D.

Use of multiple risk registers.


Expert Solution
Questions # 59:

Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?

Options:

A.

Gap analysis


B.

Threat assessment


C.

Resource skills matrix


D.

Data quality assurance plan


Expert Solution
Questions # 60:

Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?

Options:

A.

Penetration testing


B.

IT general controls audit


C.

Vulnerability assessment


D.

Fault tree analysis


Expert Solution
Questions # 61:

Which of the following provides the BEST indication that existing controls are effective?

Options:

A.

Control testing


B.

Control logging


C.

Control documentation


D.

Control design


Expert Solution
Questions # 62:

When an organization's business continuity plan (BCP) states that it cannot afford to lose more than three hours of a critical application's data, the three hours is considered the application’s:

Options:

A.

Maximum tolerable outage (MTO).


B.

Recovery point objective (RPO).


C.

Mean time to restore (MTTR).


D.

Recovery time objective (RTO).


Expert Solution
Questions # 63:

Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?

Options:

A.

Industry trends in Al


B.

Expected algorithm outputs


C.

Data feeds


D.

Alert functionality


Expert Solution
Questions # 64:

The PRIMARY benefit of using a maturity model is that it helps to evaluate the:

Options:

A.

capability to implement new processes


B.

evolution of process improvements


C.

degree of compliance with policies and procedures


D.

control requirements.


Expert Solution
Questions # 65:

The purpose of requiring source code escrow in a contractual agreement is to:

Options:

A.

ensure that the source code is valid and exists.


B.

ensure that the source code is available if the vendor ceases to exist.


C.

review the source code for adequacy of controls.


D.

ensure the source code is available when bugs occur.


Expert Solution
Questions # 66:

Which of the following BEST enables the identification of trends in risk levels?

Options:

A.

Correlation between risk levels and key risk indicators (KRIs) is positive.


B.

Measurements for key risk indicators (KRIs) are repeatable


C.

Quantitative measurements are used for key risk indicators (KRIs).


D.

Qualitative definitions for key risk indicators (KRIs) are used.


Expert Solution
Questions # 67:

Which of the following will BEST help to ensure that information system controls are effective?

Options:

A.

Responding promptly to control exceptions


B.

Implementing compensating controls


C.

Testing controls periodically


D.

Automating manual controls


Expert Solution
Questions # 68:

Which of the following is the BEST method for identifying vulnerabilities?

Options:

A.

Batch job failure monitoring


B.

Periodic network scanning


C.

Annual penetration testing


D.

Risk assessments


Expert Solution
Questions # 69:

Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?

Options:

A.

Maintain and review the classified data inventor.


B.

Implement mandatory encryption on data


C.

Conduct an awareness program for data owners and users.


D.

Define and implement a data classification policy


Expert Solution
Questions # 70:

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

Options:

A.

Perform annual risk assessments.


B.

Interview process owners.


C.

Review the risk register.


D.

Analyze key performance indicators (KPIs).


Expert Solution
Questions # 71:

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

Options:

A.

Classification of the data


B.

Type of device


C.

Remote management capabilities


D.

Volume of data


Expert Solution
Questions # 72:

Which of the following BEST indicates effective information security incident management?

Options:

A.

Monthly trend of information security-related incidents


B.

Average time to identify critical information security incidents


C.

Frequency of information security incident response plan testing


D.

Percentage of high-risk security incidents


Expert Solution
Questions # 73:

Which of the following is the BEST indication of the effectiveness of a business continuity program?

Options:

A.

Business continuity tests are performed successfully and issues are addressed.


B.

Business impact analyses are reviewed and updated in a timely manner.


C.

Business continuity and disaster recovery plans are regularly updated.


D.

Business units are familiar with the business continuity plans and process.


Expert Solution
Questions # 74:

Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?

Options:

A.

Mean time to recover (MTTR)


B.

IT system criticality classification


C.

Incident management service level agreement (SLA)


D.

Recovery time objective (RTO)


Expert Solution
Questions # 75:

Which of the following is the MAIN reason for documenting the performance of controls?

Options:

A.

Obtaining management sign-off


B.

Demonstrating effective risk mitigation


C.

Justifying return on investment


D.

Providing accurate risk reporting


Expert Solution
Questions # 76:

Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?

Options:

A.

Key risk indicators (KRIs)


B.

Risk governance charter


C.

Organizational risk appetite


D.

Cross-business representation


Expert Solution
Questions # 77:

In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?

Options:

A.

Risk questionnaire


B.

Risk register


C.

Management assertion


D.

Compliance manual


Expert Solution
Questions # 78:

Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:

Options:

A.

is in charge of information security.


B.

is responsible for enterprise risk management (ERM)


C.

can implement remediation action plans.


D.

is accountable for loss if the risk materializes.


Expert Solution
Questions # 79:

Which of the following is MOST important for developing effective key risk indicators (KRIs)?

Options:

A.

Engaging sponsorship by senior management


B.

Utilizing data and resources internal to the organization


C.

Including input from risk and business unit management


D.

Developing in collaboration with internal audit


Expert Solution
Questions # 80:

Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?

Options:

A.

Directives from legal and regulatory authorities


B.

Audit reports from internal information systems audits


C.

Automated logs collected from different systems


D.

Trend analysis of external risk factors


Expert Solution
Questions # 81:

An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?

Options:

A.

The service provider


B.

Vendor risk manager


C.

Legal counsel


D.

Business process owner


Expert Solution
Questions # 82:

Which of the following is the PRIMARY purpose of a risk register?

Options:

A.

It guides management in determining risk appetite.


B.

It provides management with a risk inventory.


C.

It aligns risk scenarios to business objectives.


D.

It monitors the performance of risk and control owners.


Expert Solution
Questions # 83:

Which of the following BEST indicates that an organization has implemented IT performance requirements?

Options:

A.

Service level agreements(SLA)


B.

Vendor references


C.

Benchmarking data


D.

Accountability matrix


Expert Solution
Questions # 84:

Which of the following should be done FIRST when information is no longer required to support business objectives?

Options:

A.

Archive the information to a backup database.


B.

Protect the information according to the classification policy.


C.

Assess the information against the retention policy.


D.

Securely and permanently erase the information


Expert Solution
Questions # 85:

An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.

Options:

A.

The risk owner who also owns the business service enabled by this infrastructure


B.

The data center manager who is also employed under the managed hosting services contract


C.

The site manager who is required to provide annual risk assessments under the contract


D.

The chief information officer (CIO) who is responsible for the hosted services


Expert Solution
Questions # 86:

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

Options:

A.

The team that performed the risk assessment


B.

An assigned risk manager to provide oversight


C.

Action plans to address risk scenarios requiring treatment


D.

The methodology used to perform the risk assessment


Expert Solution
Questions # 87:

Which of the following BEST enables the timely detection of changes in the security control environment?

Options:

A.

Control self-assessment (CSA)


B.

Log analysis


C.

Security control reviews


D.

Random sampling checks


Expert Solution
Questions # 88:

When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?

Options:

A.

Unclear organizational risk appetite


B.

Lack of senior management participation


C.

Use of highly customized control frameworks


D.

Reliance on qualitative analysis methods


Expert Solution
Questions # 89:

Which of the following is the BEST indication that key risk indicators (KRls) should be revised?

Options:

A.

A decrease in the number of critical assets covered by risk thresholds


B.

An Increase In the number of risk threshold exceptions


C.

An increase in the number of change events pending management review


D.

A decrease In the number of key performance indicators (KPls)


Expert Solution
Questions # 90:

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

Options:

A.

KRIs provide an early warning that a risk threshold is about to be reached.


B.

KRIs signal that a change in the control environment has occurred.


C.

KRIs provide a basis to set the risk appetite for an organization.


D.

KRIs assist in the preparation of the organization's risk profile.


Expert Solution
Questions # 91:

Which of the following is the MAIN purpose of monitoring risk?

Options:

A.

Communication


B.

Risk analysis


C.

Decision support


D.

Benchmarking


Expert Solution
Questions # 92:

A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?

Options:

A.

Training and awareness of employees for increased vigilance


B.

Increased monitoring of executive accounts


C.

Subscription to data breach monitoring sites


D.

Suspension and takedown of malicious domains or accounts


Expert Solution
Questions # 93:

Which of the following is the MOST efficient method for monitoring control effectiveness?

Options:

A.

Conduct control self-assessments (CSAs)


B.

Review system performance logs


C.

Compare controls to business metrics


D.

Perform independent periodic control testing


Expert Solution
Questions # 94:

Which of the following activities is a responsibility of the second line of defense?

Options:

A.

Challenging risk decision making


B.

Developing controls to manage risk scenarios


C.

Implementing risk response plans


D.

Establishing organizational risk appetite


Expert Solution
Questions # 95:

Which of the following criteria is MOST important when developing a response to an attack that would compromise data?

Options:

A.

The recovery time objective (RTO)


B.

The likelihood of a recurring attack


C.

The organization's risk tolerance


D.

The business significance of the information


Expert Solution
Questions # 96:

Which of the following activities should only be performed by the third line of defense?

Options:

A.

Operating controls for risk mitigation


B.

Testing the effectiveness and efficiency of internal controls


C.

Providing assurance on risk management processes


D.

Recommending risk treatment options


Expert Solution
Questions # 97:

Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?

Options:

A.

Establishing a risk management committee


B.

Updating the organization's risk register to reflect the new threat


C.

Communicating the results of the threat impact analysis


D.

Establishing metrics to assess the effectiveness of the responses


Expert Solution
Questions # 98:

An organization's risk tolerance should be defined and approved by which of the following?

Options:

A.

The chief risk officer (CRO)


B.

The board of directors


C.

The chief executive officer (CEO)


D.

The chief information officer (CIO)


Expert Solution
Questions # 99:

Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?

Options:

A.

Mean time between failures (MTBF)


B.

Mean time to recover (MTTR)


C.

Planned downtime


D.

Unplanned downtime


Expert Solution
Questions # 100:

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?

Options:

A.

Frequency of anti-virus software updates


B.

Number of alerts generated by the anti-virus software


C.

Number of false positives detected over a period of time


D.

Percentage of IT assets with current malware definitions


Expert Solution
Viewing page 2 out of 11 pages
Viewing questions 51-100 out of questions