Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 101-150 out of questions
Questions # 101:

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

Options:

A.

introduced into production without high-risk issues.


B.

having the risk register updated regularly.


C.

having key risk indicators (KRIs) established to measure risk.


D.

having an action plan to remediate overdue issues.


Expert Solution
Questions # 102:

Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?

Options:

A.

Gap analysis


B.

Threat assessment


C.

Resource skills matrix


D.

Data quality assurance plan


Expert Solution
Questions # 103:

Which of the following is a benefit of implementing user and entity behavior analytics to help mitigate information security threats?

Options:

A.

Device activity is centrally logged.


B.

Changes to user credentials are monitored.


C.

Data assets are effectively inventoried.


D.

Attacks are identified against a baseline of activity.


Expert Solution
Questions # 104:

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to " owing would provide the MOST useful information to determine mitigating controls?

Options:

A.

Forensic analysis


B.

Risk assessment


C.

Root cause analysis


D.

Business impact analysis (BlA)


Expert Solution
Questions # 105:

Which of the following is the BEST control to prevent unauthorized access to an organization ' s critical assets?

Options:

A.

Data loss prevention (DLP)


B.

Intrusion detection system (IDS)


C.

Multi-factor authentication (MFA)


D.

Intrusion prevention system (IPS)


Expert Solution
Questions # 106:

Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

Options:

A.

To provide input to the organization ' s risk appetite


B.

To monitor the vendor ' s control effectiveness


C.

To verify the vendor ' s ongoing financial viability


D.

To assess the vendor ' s risk mitigation plans


Expert Solution
Questions # 107:

Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?

Options:

A.

Manual vulnerability scanning processes


B.

Organizational reliance on third-party service providers


C.

Inaccurate documentation of enterprise architecture (EA)


D.

Risk-averse organizational risk appetite


Expert Solution
Questions # 108:

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

Options:

A.

Implement a tool to create and distribute violation reports


B.

Raise awareness of encryption requirements for sensitive data.


C.

Block unencrypted outgoing emails which contain sensitive data.


D.

Implement a progressive disciplinary process for email violations.


Expert Solution
Questions # 109:

During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?

Options:

A.

Implement compensating controls to reduce residual risk


B.

Escalate the issue to senior management


C.

Discuss risk mitigation options with the risk owner.


D.

Certify the control after documenting the concern.


Expert Solution
Questions # 110:

Which of the following should management consider when selecting a risk mitigation option?

Options:

A.

Maturity of the enterprise architecture


B.

Cost of control implementation


C.

Reliability of key performance indicators (KPIs)


D.

Reliability of key risk indicators (KPIs)


Expert Solution
Questions # 111:

Which of the following is the BEST way to address a board ' s concern about the organization ' s current cybersecurity posture?

Options:

A.

Increase the frequency of vulnerability testing.


B.

Assess security capabilities against an industry framework


C.

Update security risk scenarios.


D.

Create a new security risk officer role.


Expert Solution
Questions # 112:

Which of the following conditions presents the GREATEST risk to an application?

Options:

A.

Application controls are manual.


B.

Application development is outsourced.


C.

Source code is escrowed.


D.

Developers have access to production environment.


Expert Solution
Questions # 113:

An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:

Options:

A.

a lack of mitigating actions for identified risk


B.

decreased threat levels


C.

ineffective service delivery


D.

ineffective IT governance


Expert Solution
Questions # 114:

Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?

Options:

A.

Application monitoring


B.

Separation of duty


C.

Least privilege


D.

Nonrepudiation


Expert Solution
Questions # 115:

An organization is developing a plan to address new information security risks emerging from business changes. Which of the following BEST enables stakeholders to make decisions impacting organizational strategy?

Options:

A.

The impact of the new risk is clearly presented


B.

Benchmarking information is provided


C.

Technical expertise to address new risk scenarios is available


D.

The cost of implementing the strategy is within budget


Expert Solution
Questions # 116:

A risk practitioner learns of an urgent threat intelligence alert to patch a critical vulnerability identified in the organization ' s operating system. Which of the following should the risk practitioner do FIRST?

Options:

A.

Patch the operating system immediately


B.

Determine whether any active attacks are exploiting the vulnerability


C.

Invoke the organization ' s incident response plan


D.

Evaluate the threat in the context of the organization ' s IT environment


Expert Solution
Questions # 117:

Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?

Options:

A.

Updating the threat inventory with new threats


B.

Automating log data analysis


C.

Preventing the generation of false alerts


D.

Determining threshold levels


Expert Solution
Questions # 118:

Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

Options:

A.

a gap analysis


B.

a root cause analysis.


C.

an impact assessment.


D.

a vulnerability assessment.


Expert Solution
Questions # 119:

Which of the following is the BEST indication of a mature organizational risk culture?

Options:

A.

Corporate risk appetite is communicated to staff members.


B.

Risk owners understand and accept accountability for risk.


C.

Risk policy has been published and acknowledged by employees.


D.

Management encourages the reporting of policy breaches.


Expert Solution
Questions # 120:

Which risk response strategy could management apply to both positive and negative risk that has been identified?

Options:

A.

Transfer


B.

Accept


C.

Exploit


D.

Mitigate


Expert Solution
Questions # 121:

Which of the following is the BEST course of action for a system administrator who suspects a colleague may be intentionally weakening a system ' s validation controls in order to pass through fraudulent transactions?

Options:

A.

Implement compensating controls to deter fraud attempts.


B.

Share the concern through a whistleblower communication channel.


C.

Monitor the activity to collect evidence.


D.

Determine whether the system environment has flaws that may motivate fraud attempts.


Expert Solution
Questions # 122:

Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?

Options:

A.

To better understand inherent and residual risk within the organization


B.

To gain objective insight into the effectiveness and efficiency of controls


C.

To demonstrate compliance with regulatory and legal control requirements


D.

To facilitate timely and accurate updates to the risk register


Expert Solution
Questions # 123:

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

Options:

A.

Continuous monitoring


B.

A control self-assessment


C.

Transaction logging


D.

Benchmarking against peers


Expert Solution
Questions # 124:

What is the PRIMARY purpose of a business impact analysis (BIA)?

Options:

A.

To determine the likelihood and impact of threats to business operations


B.

To identify important business processes in the organization


C.

To estimate resource requirements for related business processes


D.

To evaluate the priority of business operations in case of disruption


Expert Solution
Questions # 125:

A business manager wants to leverage an existing approved vendor solution from another area within the organization. Which of the following is the risk practitioner ' s BEST course of action?

Options:

A.

Recommend allowing the new usage based on prior approval.


B.

Request a new third-party review.


C.

Request revalidation of the original use case.


D.

Assess the risk associated with the new use case.


Expert Solution
Questions # 126:

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response '

Options:

A.

Identify the regulatory bodies that may highlight this gap


B.

Highlight news articles about data breaches


C.

Evaluate the risk as a measure of probable loss


D.

Verify if competitors comply with a similar policy


Expert Solution
Questions # 127:

Key performance indicators (KPIs) are BEST utilized to provide a high-level overview of:

Options:

A.

control efficiency


B.

cost effectiveness


C.

return on investment (ROI)


D.

changes in risk tolerance


Expert Solution
Questions # 128:

An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?

Options:

A.

Percentage of standard supplier uptime


B.

Average time to respond to incidents


C.

Number of assets included in recovery processes


D.

Number of key applications hosted


Expert Solution
Questions # 129:

Risk appetite should be PRIMARILY driven by which of the following?

Options:

A.

Enterprise security architecture roadmap


B.

Stakeholder requirements


C.

Legal and regulatory requirements


D.

Business impact analysis (BIA)


Expert Solution
Questions # 130:

Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?

Options:

A.

Assess the vulnerability management process.


B.

Conduct a control serf-assessment.


C.

Conduct a vulnerability assessment.


D.

Reassess the inherent risk of the target.


Expert Solution
Questions # 131:

Which of the following is the BEST way for a risk practitioner to consolidate the results of risk assessments across multiple operating units?

Options:

A.

Perform additional risk assessments and create an enterprise risk matrix.


B.

Implement a governance, risk and compliance (GRC) system.


C.

Aggregate operating unit risk registers to a central risk register.


D.

Update departmental risk registers with items from the central risk register.


Expert Solution
Questions # 132:

Senior management has requested a risk practitioner ' s guidance on whether

a new technical control requested by a business unit is worth the investment.

Which of the following should be the MOST important consideration before

providing input?

Options:

A.

The cost of the control relative to the value of risk mitigation


B.

The effectiveness of the control at reducing residual risk levels


C.

The likelihood of a successful attack based on current risk


D.

assessments


E.

The availabilitv of budgeted funds for risk mitigationMitination


Expert Solution
Questions # 133:

Which process is MOST effective to determine relevance of threats for risk scenarios?

Options:

A.

Vulnerability assessment


B.

Business impact analysis (BIA)


C.

Penetration testing


D.

Root cause analysis


Expert Solution
Questions # 134:

Which of the following is MOST important to ensure before using risk reports in decision making?

Options:

A.

Root cause analysis is included.


B.

Risk analysis results are validated.


C.

Real-time risk information is provided.


D.

Quantitative risk data is provided.


Expert Solution
Questions # 135:

Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?

Options:

A.

It ensures compliance with the risk management framework.


B.

It ensures an effective risk aggregation process.


C.

It ensures decisions are risk-informed.


D.

It ensures a consistent approach for risk assessments.


Expert Solution
Questions # 136:

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

Options:

A.

Cost of controls


B.

Risk tolerance


C.

Risk appetite


D.

Probability definition


Expert Solution
Questions # 137:

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

Options:

A.

Number of training sessions completed


B.

Percentage of staff members who complete the training with a passing score


C.

Percentage of attendees versus total staff


D.

Percentage of staff members who attend the training with positive feedback


Expert Solution
Questions # 138:

When reporting on the performance of an organization ' s control environment including which of the following would BEST inform stakeholders risk decision-making?

Options:

A.

The audit plan for the upcoming period


B.

Spend to date on mitigating control implementation


C.

A report of deficiencies noted during controls testing


D.

A status report of control deployment


Expert Solution
Questions # 139:

Which of the following is the BEST way to support communication of emerging risk?

Options:

A.

Update residual risk levels to reflect the expected risk impact.


B.

Adjust inherent risk levels upward.


C.

Include it on the next enterprise risk committee agenda.


D.

Include it in the risk register for ongoing monitoring.


Expert Solution
Questions # 140:

Which of the following is the BEST indication of the effectiveness of a business continuity program?

Options:

A.

Business continuity tests are performed successfully and issues are addressed.


B.

Business impact analyses are reviewed and updated in a timely manner.


C.

Business continuity and disaster recovery plans are regularly updated.


D.

Business units are familiar with the business continuity plans and process.


Expert Solution
Questions # 141:

A risk assessment has identified that an organization may not be in compliance with industry regulations. The BEST course of action would be to:

Options:

A.

conduct a gap analysis against compliance criteria.


B.

identify necessary controls to ensure compliance.


C.

modify internal assurance activities to include control validation.


D.

collaborate with management to meet compliance requirements.


Expert Solution
Questions # 142:

Which of the following is the MOST important component of effective security incident response?

Options:

A.

Network time protocol synchronization


B.

Identification of attack sources


C.

Early detection of breaches


D.

A documented communications plan


Expert Solution
Questions # 143:

Which of the following is the GREATEST concern if user acceptance testing (UAT) is not conducted when implementing a new application?

Options:

A.

The probability of application defects will increase


B.

Data confidentiality could be compromised


C.

Increase in the use of redundant processes


D.

The application could fail to meet defined business requirements


Expert Solution
Questions # 144:

A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?

Options:

A.

Consult with industry peers regarding cloud best practices.


B.

Evaluate adherence to existing IT policies and standards.


C.

Determine gaps between the current state and target framework.


D.

Adopt an industry-leading cloud computing framework.


Expert Solution
Questions # 145:

From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?

Options:

A.

To reduce incident response times defined in SLAs


B.

To satisfy senior management expectations for incident response


C.

To ensure risk has been reduced to acceptable levels


D.

To minimize the likelihood of future occurrences


Expert Solution
Questions # 146:

Which of the following is the MOST important input when developing risk scenarios?

Options:

A.

Key performance indicators


B.

Business objectives


C.

The organization ' s risk framework


D.

Risk appetite


Expert Solution
Questions # 147:

Which of the following is the BEST method for determining an enterprise ' s current appetite for risk?

Options:

A.

Comparative analysis of peer companies


B.

Reviews of brokerage firm assessments


C.

Interviews with senior management


D.

Trend analysis using prior annual reports


Expert Solution
Questions # 148:

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

Options:

A.

Segregation of duties


B.

Three lines of defense


C.

Compliance review


D.

Quality assurance review


Expert Solution
Questions # 149:

Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?

Options:

A.

Impact analysis


B.

Control analysis


C.

Root cause analysis


D.

Threat analysis


Expert Solution
Questions # 150:

Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?

Options:

A.

Review risk tolerance levels


B.

Maintain the current controls.


C.

Analyze the effectiveness of controls.


D.

Execute the risk response plan


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 101-150 out of questions