Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 3 out of 12 pages
Viewing questions 101-150 out of questions
Questions # 101:

What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?

Options:

A.

Seek approval from the control owner.


B.

Update the action plan in the risk register.


C.

Reassess the risk level associated with the new control.


D.

Validate that the control has an established testing method.


Expert Solution
Questions # 102:

An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?

Options:

A.

Risk mitigation


B.

Risk avoidance


C.

Risk acceptance


D.

Risk transfer


Expert Solution
Questions # 103:

Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?

Options:

A.

Total cost of ownership


B.

Resource dependency analysis


C.

Cost-benefit analysis


D.

Business impact analysis


Expert Solution
Questions # 104:

Which of the following is the BEST way to detect zero-day malware on an end user's workstation?

Options:

A.

An antivirus program


B.

Database activity monitoring


C.

Firewall log monitoring


D.

File integrity monitoring


Expert Solution
Questions # 105:

The PRIMARY purpose of using a framework for risk analysis is to:

Options:

A.

improve accountability


B.

improve consistency


C.

help define risk tolerance


D.

help develop risk scenarios.


Expert Solution
Questions # 106:

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

Options:

A.

Collecting data for IT risk assessment


B.

Establishing and communicating the IT risk profile


C.

Utilizing a balanced scorecard


D.

Performing and publishing an IT risk analysis


Expert Solution
Questions # 107:
Options:

A.

Average time to contain security incidents


B.

Percentage of systems being monitored


C.

Number of false positives reported


D.

Number of personnel dedicated to security monitoring


Expert Solution
Questions # 108:

Which of the following is a risk practitioner's BEST recommendation regarding disaster recovery management (DRM) for Software as a Service (SaaS) providers?

Options:

A.

Conduct inoremental backups of data in the SaaS environment to a local data center.


B.

Implement segregation of duties between multiple SaaS solution providers.


C.

Codify availability requirements in the SaaS provider's contract.


D.

Conduct performance benchmarking against other SaaS service providers.


Expert Solution
Questions # 109:

Which of the following is the GREATEST benefit of involving business owners in risk scenario development?

Options:

A.

Business owners have the ability to effectively manage risk.


B.

Business owners have authority to approve control implementation.


C.

Business owners understand the residual risk of competitors.


D.

Business owners are able to assess the impact.


Expert Solution
Questions # 110:

A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?

Options:

A.

Internal audit


B.

Control owner


C.

Senior management


D.

Risk manager


Expert Solution
Questions # 111:

The BEST way to test the operational effectiveness of a data backup procedure is to:

Options:

A.

conduct an audit of files stored offsite.


B.

interview employees to compare actual with expected procedures.


C.

inspect a selection of audit trails and backup logs.


D.

demonstrate a successful recovery from backup files.


Expert Solution
Questions # 112:

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

Options:

A.

To support regulatory requirements


B.

To prevent the risk scenario in the current environment


C.

To monitor for potential changes to the risk scenario


D.

To track historical risk assessment results


Expert Solution
Questions # 113:

Which of the following poses the GREATEST risk to an organization's operations during a major it transformation?

Options:

A.

Lack of robust awareness programs


B.

infrequent risk assessments of key controls


C.

Rapid changes in IT procedures


D.

Unavailability of critical IT systems


Expert Solution
Questions # 114:

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

Options:

A.

The head of enterprise architecture (EA)


B.

The IT risk manager


C.

The information security manager


D.

The product owner


Expert Solution
Questions # 115:

Which of the following should an organization perform to forecast the effects of a disaster?

Options:

A.

Develop a business impact analysis (BIA).


B.

Define recovery time objectives (RTO).


C.

Analyze capability maturity model gaps.


D.

Simulate a disaster recovery.


Expert Solution
Questions # 116:

Which of the following is the PRIMARY benefit of using a risk profile?

Options:

A.

It promotes a security-aware culture.


B.

It enables vulnerability analysis.


C.

It enhances internal risk reporting.


D.

It provides risk information to auditors.


Expert Solution
Questions # 117:

Key performance indicators (KPIs) are BEST utilized to provide a high-level overview of:

Options:

A.

control efficiency


B.

cost effectiveness


C.

return on investment (ROI)


D.

changes in risk tolerance


Expert Solution
Questions # 118:

Which of the following is MOST critical to the design of relevant risk scenarios?

Options:

A.

The scenarios are based on past incidents.


B.

The scenarios are linked to probable organizational situations.


C.

The scenarios are mapped to incident management capabilities.


D.

The scenarios are aligned with risk management capabilities.


Expert Solution
Questions # 119:

Which of the following is the BEST control to detect an advanced persistent threat (APT)?

Options:

A.

Utilizing antivirus systems and firewalls


B.

Conducting regular penetration tests


C.

Monitoring social media activities


D.

Implementing automated log monitoring


Expert Solution
Questions # 120:

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

Options:

A.

Risk tolerance


B.

Risk appetite


C.

Risk awareness


D.

Risk policy


Expert Solution
Questions # 121:

Which of the following BEST reduces the risk associated with the theft of a laptop containing sensitive information?

Options:

A.

Cable lock


B.

Data encryption


C.

Periodic backup


D.

Biometrics access control


Expert Solution
Questions # 122:

Which of the following presents the GREATEST concern associated with the

use of artificial intelligence (Al) systems?

Options:

A.

Al systems need to be available continuously.


B.

Al systems can be affected by bias.


C.

Al systems are expensive to maintain.


D.

Al systems can provide false positives.


Expert Solution
Questions # 123:

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

Options:

A.

It compares performance levels of IT assets to value delivered.


B.

It facilitates the alignment of strategic IT objectives to business objectives.


C.

It provides input to business managers when preparing a business case for new IT projects.


D.

It helps assess the effects of IT decisions on risk exposure


Expert Solution
Questions # 124:

Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?

Options:

A.

Results of current and past risk assessments


B.

Organizational strategy and objectives


C.

Lessons learned from materialized risk scenarios


D.

Internal and external audit findings


Expert Solution
Questions # 125:

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?

Options:

A.

Forensic analysis


B.

Risk assessment


C.

Root cause analysis


D.

Business impact analysis (BlA)


Expert Solution
Questions # 126:

Which of the following is the BEST control to minimize the risk associated with scope creep in software development?

Options:

A.

An established process for project change management


B.

Retention of test data and results for review purposes


C.

Business managements review of functional requirements


D.

Segregation between development, test, and production


Expert Solution
Questions # 127:

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

Options:

A.

Assess the loss impact if the information is inadvertently disclosed


B.

Calculate the overhead required to keep the information secure throughout its life cycle


C.

Calculate the replacement cost of obtaining the information from alternate sources


D.

Assess the market value offered by consumers of the information


Expert Solution
Questions # 128:

Risk management strategies are PRIMARILY adopted to:

Options:

A.

take necessary precautions for claims and losses.


B.

achieve acceptable residual risk levels.


C.

avoid risk for business and IT assets.


D.

achieve compliance with legal requirements.


Expert Solution
Questions # 129:

Which of the following BEST enables senior management lo compare the ratings of risk scenarios?

Options:

A.

Key risk indicators (KRIs)


B.

Key performance indicators (KPIs)


C.

Control self-assessment (CSA)


D.

Risk heat map


Expert Solution
Questions # 130:

Which of the following is the BEST method to ensure a terminated employee's access to IT systems is revoked upon departure from the organization?

Options:

A.

Login attempts are reconciled to a list of terminated employees.


B.

A list of terminated employees is generated for reconciliation against current IT access.


C.

A process to remove employee access during the exit interview is implemented.


D.

The human resources (HR) system automatically revokes system access.


Expert Solution
Questions # 131:

Deviation from a mitigation action plan's completion date should be determined by which of the following?

Options:

A.

Change management as determined by a change control board


B.

Benchmarking analysis with similar completed projects


C.

Project governance criteria as determined by the project office


D.

The risk owner as determined by risk management processes


Expert Solution
Questions # 132:

A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider who should the risk scenario be reassigned to.

Options:

A.

Senior management


B.

Chief risk officer (CRO)


C.

Vendor manager


D.

Data owner


Expert Solution
Questions # 133:

Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?

Options:

A.

It provides assurance of timely business process response and effectiveness.


B.

It supports effective use of resources and provides reasonable confidence of recoverability.


C.

It enables effective BCP maintenance and updates to reflect organizational changes.


D.

It decreases the risk of downtime and operational losses in the event of a disruption.


Expert Solution
Questions # 134:

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

Options:

A.

Perform annual risk assessments.


B.

Interview process owners.


C.

Review the risk register.


D.

Analyze key performance indicators (KPIs).


Expert Solution
Questions # 135:

Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?

Options:

A.

Internet of Things (IoT)


B.

Quantum computing


C.

Virtual reality (VR)


D.

Machine learning


Expert Solution
Questions # 136:

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

Options:

A.

Cost of controls


B.

Risk tolerance


C.

Risk appetite


D.

Probability definition


Expert Solution
Questions # 137:

Which of the following is the MOST important consideration when implementing ethical remote work monitoring?

Options:

A.

Monitoring is only conducted between official hours of business


B.

Employees are informed of how they are bong monitored


C.

Reporting on nonproductive employees is sent to management on a scheduled basis


D.

Multiple data monitoring sources are integrated into security incident response procedures


Expert Solution
Questions # 138:

Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?

Options:

A.

Key risk indicators (KRIs)


B.

The owner of the financial reporting process


C.

The risk rating of affected financial processes


D.

The list of relevant financial controls


Expert Solution
Questions # 139:

Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?

Options:

A.

Monitor risk controls.


B.

Implement preventive measures.


C.

Implement detective controls.


D.

Transfer the risk.


Expert Solution
Questions # 140:

Which of the following is the GREATEST risk associated with the use of data analytics?

Options:

A.

Distributed data sources


B.

Manual data extraction


C.

Incorrect data selection


D.

Excessive data volume


Expert Solution
Questions # 141:

A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?

Options:

A.

Document the finding in the risk register.


B.

Invoke the incident response plan.


C.

Re-evaluate key risk indicators.


D.

Modify the design of the control.


Expert Solution
Questions # 142:

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Collaborate with the risk owner to determine the risk response plan.


B.

Document the gap in the risk register and report to senior management.


C.

Include a right to audit clause in the service provider contract.


D.

Advise the risk owner to accept the risk.


Expert Solution
Questions # 143:

An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?

Options:

A.

Maximum time gap between patch availability and deployment


B.

Percentage of critical patches deployed within three weeks


C.

Minimum time gap between patch availability and deployment


D.

Number of critical patches deployed within three weeks


Expert Solution
Questions # 144:

Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?

Options:

A.

Service level agreement (SLA)


B.

Critical success factor (CSF)


C.

Key risk indicator (KRI)


D.

Key performance indicator (KPI)


Expert Solution
Questions # 145:

Which of the following is the FIRST step when developing a business case to drive the adoption of a risk remediation project by senior management?

Options:

A.

Calculating the cost


B.

Analyzing cost-effectiveness


C.

Determining the stakeholders


D.

Identifying the objectives


Expert Solution
Questions # 146:

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

Options:

A.

plan awareness programs for business managers.


B.

evaluate maturity of the risk management process.


C.

assist in the development of a risk profile.


D.

maintain a risk register based on noncompliance.


Expert Solution
Questions # 147:

For a large software development project, risk assessments are MOST effective when performed:

Options:

A.

before system development begins.


B.

at system development.


C.

at each stage of the system development life cycle (SDLC).


D.

during the development of the business case.


Expert Solution
Questions # 148:

Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?

Options:

A.

Published vulnerabilities relevant to the business


B.

Threat actors that can trigger events


C.

Events that could potentially impact the business


D.

IT assets requiring the greatest investment


Expert Solution
Questions # 149:

Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?

Options:

A.

Changes in the organization's risk appetite and risk tolerance levels


B.

Impact due to changes in external and internal risk factors


C.

Changes in residual risk levels against acceptable levels


D.

Gaps in best practices and implemented controls across the industry


Expert Solution
Questions # 150:

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

Options:

A.

Identifying tweets that may compromise enterprise architecture (EA)


B.

Including diverse Business scenarios in user acceptance testing (UAT)


C.

Performing risk assessments during the business case development stage


D.

Including key stakeholders in review of user requirements


Expert Solution
Viewing page 3 out of 12 pages
Viewing questions 101-150 out of questions