Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 101-150 out of questions
Questions # 101:

Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?

Options:

A.

Assess the vulnerability management process.


B.

Conduct a control serf-assessment.


C.

Conduct a vulnerability assessment.


D.

Reassess the inherent risk of the target.


Expert Solution
Questions # 102:

Which of the following is MOST important for an organization to have in place when developing a risk management framework?

Options:

A.

A strategic approach to risk including an established risk appetite


B.

A risk-based internal audit plan for the organization


C.

A control function within the risk management team


D.

An organization-wide risk awareness training program


Expert Solution
Questions # 103:

Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?

Options:

A.

Identify the potential risk.


B.

Monitor employee usage.


C.

Assess the potential risk.


D.

Develop risk awareness training.


Expert Solution
Questions # 104:

Risk mitigation procedures should include:

Options:

A.

buying an insurance policy.


B.

acceptance of exposures


C.

deployment of counter measures.


D.

enterprise architecture implementation.


Expert Solution
Questions # 105:

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

Options:

A.

To provide insight into the effectiveness of the internal control environment


B.

To provide a basis for determining the criticality of risk mitigation controls


C.

To provide benchmarks for assessing control design effectiveness against industry peers


D.

To provide early warning signs of a potential change in risk level


Expert Solution
Questions # 106:

An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?

Options:

A.

Audit reports


B.

Industry benchmarks


C.

Financial forecasts


D.

Annual threat reports


Expert Solution
Questions # 107:

The MOST important objective of information security controls is to:

Options:

A.

Identify threats and vulnerability


B.

Ensure alignment with industry standards


C.

Provide measurable risk reduction


D.

Enforce strong security solutions


Expert Solution
Questions # 108:

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

Options:

A.

Collecting data for IT risk assessment


B.

Establishing and communicating the IT risk profile


C.

Utilizing a balanced scorecard


D.

Performing and publishing an IT risk analysis


Expert Solution
Questions # 109:

A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?

Options:

A.

Encryption


B.

Authentication


C.

Configuration


D.

Backups


Expert Solution
Questions # 110:

External auditors have found that management has not effectively monitored key security technologies that support regulatory objectives. Which type of indicator would BEST enable the organization to identify and correct this situation?

Options:

A.

Key Performance Indicator (KPI)


B.

Key Management Indicator (KMI)


C.

Key Risk Indicator (KRI)


D.

Key Control Indicator (KCI)


Expert Solution
Questions # 111:

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

Options:

A.

Monitoring risk responses


B.

Applying risk treatments


C.

Providing assurance of control effectiveness


D.

Implementing internal controls


Expert Solution
Questions # 112:

An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?

Options:

A.

Review assignments of data ownership for key assets.


B.

Identify staff who have access to the organization’s sensitive data.


C.

Identify recent and historical incidents involving data loss.


D.

Review the organization's data inventory.


Expert Solution
Questions # 113:

Which of the following would BEST help minimize the risk associated with social engineering threats?

Options:

A.

Enforcing employees’ sanctions


B.

Conducting phishing exercises


C.

Enforcing segregation of dunes


D.

Reviewing the organization's risk appetite


Expert Solution
Questions # 114:

Which of the following approaches BEST identifies information systems control deficiencies?

Options:

A.

Countermeasures analysis


B.

Best practice assessment


C.

Gap analysis


D.

Risk assessment


Expert Solution
Questions # 115:

What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?

Options:

A.

Use the severity rating to calculate risk.


B.

Classify the risk scenario as low-probability.


C.

Use the highest likelihood identified by risk management.


D.

Rely on range-based estimates provided by subject-matter experts.


Expert Solution
Questions # 116:

Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?

Options:

A.

Incident reports


B.

Cost-benefit analysis


C.

Risk tolerance


D.

Control objectives


Expert Solution
Questions # 117:

To ensure key risk indicators (KRIs) are effective and meaningful, the KRIs should be aligned to:

Options:

A.

A control framework


B.

Industry standards


C.

Capability maturity targets


D.

Business processes


Expert Solution
Questions # 118:

Which of the following activities is PRIMARILY the responsibility of senior management?

Options:

A.

Bottom-up identification of emerging risks


B.

Categorization of risk scenarios against a standard taxonomy


C.

Prioritization of risk scenarios based on severity


D.

Review of external loss data


Expert Solution
Questions # 119:

Which of the following is the GREATEST benefit of identifying appropriate risk owners?

Options:

A.

Accountability is established for risk treatment decisions


B.

Stakeholders are consulted about risk treatment options


C.

Risk owners are informed of risk treatment options


D.

Responsibility is established for risk treatment decisions.


Expert Solution
Questions # 120:

Which of the following is a KEY outcome of risk ownership?

Options:

A.

Risk responsibilities are addressed.


B.

Risk-related information is communicated.


C.

Risk-oriented tasks are defined.


D.

Business process risk is analyzed.


Expert Solution
Questions # 121:

Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?

Options:

A.

Providing risk awareness training for business units


B.

Obtaining input from business management


C.

Understanding the business controls currently in place


D.

Conducting a business impact analysis (BIA)


Expert Solution
Questions # 122:

Which of the following is the BEST evidence that risk management is driving business decisions in an organization?

Options:

A.

Compliance breaches are addressed in a timely manner.


B.

Risk ownership is identified and assigned.


C.

Risk treatment options receive adequate funding.


D.

Residual risk is within risk tolerance.


Expert Solution
Questions # 123:

Which of the following BEST enables the integration of IT risk management across an organization?

Options:

A.

Enterprise risk management (ERM) framework


B.

Enterprise-wide risk awareness training


C.

Robust risk reporting practices


D.

Risk management policies


Expert Solution
Questions # 124:

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?

Options:

A.

Ask the business to make a budget request to remediate the problem.


B.

Build a business case to remediate the fix.


C.

Research the types of attacks the threat can present.


D.

Determine the impact of the missing threat.


Expert Solution
Questions # 125:

When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:

Options:

A.

that results in a full root cause analysis.


B.

used for verification within the SLA.


C.

that are verified as actual incidents.


D.

resolved within the SLA.


Expert Solution
Questions # 126:

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

Options:

A.

Relevance to the business process


B.

Regulatory compliance requirements


C.

Cost-benefit analysis


D.

Comparison against best practice


Expert Solution
Questions # 127:

A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?

Options:

A.

The audit had a broader scope than the CSA.


B.

The CSA was not sample-based.


C.

The CSA did not test control effectiveness.


D.

The CSA was compliance-based, while the audit was risk-based.


Expert Solution
Questions # 128:

Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

Options:

A.

Data duplication processes


B.

Data archival processes


C.

Data anonymization processes


D.

Data protection processes


Expert Solution
Questions # 129:

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

Options:

A.

Implementing risk treatment plans


B.

Validating the status of risk mitigation efforts


C.

Establishing risk policies and standards


D.

Conducting independent reviews of risk assessment results


Expert Solution
Questions # 130:

Which of the following would be MOST effective in monitoring changes in an organization's IT risk environment?

Options:

A.

Lagging indicators


B.

Risk mitigation plans


C.

Industry regulatory reports


D.

Risk inventory


Expert Solution
Questions # 131:

Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?

Options:

A.

Segregation of duties


B.

Code review


C.

Change management


D.

Audit modules


Expert Solution
Questions # 132:

During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?

Options:

A.

Schedule periodic reviews of the compensating controls' effectiveness.


B.

Report the use of compensating controls to senior management.


C.

Recommend additional IT controls to further reduce residual risk.


D.

Request that ownership of the compensating controls is reassigned to IT


Expert Solution
Questions # 133:

Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?

Options:

A.

The KRIs' source data lacks integrity.


B.

The KRIs are not automated.


C.

The KRIs are not quantitative.


D.

The KRIs do not allow for trend analysis.


Expert Solution
Questions # 134:

A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?

Options:

A.

Mean time to restore (MTTR)


B.

Recovery time objective (RTO)


C.

Recovery point objective (RPO)


D.

Mean time to detect (MTTD)


Expert Solution
Questions # 135:

Which of the following is the GREATEST benefit of using IT risk scenarios?

Options:

A.

They support compliance with regulations.


B.

They provide evidence of risk assessment.


C.

They facilitate communication of risk.


D.

They enable the use of key risk indicators (KRls)


Expert Solution
Questions # 136:

Which of the following BEST supports an accurate asset inventory system?

Options:

A.

Asset management metrics are aligned to industry benchmarks


B.

Organizational information risk controls are continuously monitored


C.

There are defined processes in place for onboarding assets


D.

The asset management team is involved in the budgetary planning process


Expert Solution
Questions # 137:

Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?

Options:

A.

Likelihood rating


B.

Control effectiveness


C.

Assessment approach


D.

Impact rating


Expert Solution
Questions # 138:

Which of the following would present the MOST significant risk to an organization when updating the incident response plan?

Options:

A.

Obsolete response documentation


B.

Increased stakeholder turnover


C.

Failure to audit third-party providers


D.

Undefined assignment of responsibility


Expert Solution
Questions # 139:

Which of the following should be considered FIRST when managing a risk event related to theft and disclosure of customer information?

Options:

A.

Protecting the organization from negative publicity


B.

Performing a root cause analysis to prevent incident recurrence


C.

Containing the impact of the incident to affected customers


D.

Preventing further dissemination of customer information


Expert Solution
Questions # 140:

After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?

Options:

A.

Implement new controls.


B.

Update the risk profile.


C.

Re-evaluate the risk tolerance.


D.

Inform executive leadership.


Expert Solution
Questions # 141:

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?

Options:

A.

Forensic analysis


B.

Risk assessment


C.

Root cause analysis


D.

Business impact analysis (BlA)


Expert Solution
Questions # 142:

Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?

Options:

A.

Senior management has approved the control design.


B.

Inherent risk has been reduced from original levels.


C.

Residual risk remains within acceptable levels.


D.

Costs for control maintenance are reasonable.


Expert Solution
Questions # 143:

What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?

Options:

A.

Review regular control testing results.


B.

Recommend a penetration test.


C.

Assess the risk to determine mitigation needed.


D.

Analyze key performance indicators (KPIs).


Expert Solution
Questions # 144:

An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?

Options:

A.

Implement IT systems in alignment with business objectives.


B.

Review metrics and key performance indicators (KPIs).


C.

Review design documentation of IT systems.


D.

Evaluate compliance with legal and regulatory requirements.


Expert Solution
Questions # 145:

What should a risk practitioner do FIRST when a shadow IT application is identified in a business owner's business impact analysis (BIA)?

Options:

A.

Include the application in the business continuity plan (BCP).


B.

Determine the business purpose of the application.


C.

Segregate the application from the network.


D.

Report the finding to management.


Expert Solution
Questions # 146:

Who should be responsible for implementing and maintaining security controls?

Options:

A.

End user


B.

Internal auditor


C.

Data owner


D.

Data custodian


Expert Solution
Questions # 147:

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

Options:

A.

Enroll the employee in additional security training.


B.

Invoke the incident response plan.


C.

Conduct an internal audit.


D.

Instruct the vendor to delete the data.


Expert Solution
Questions # 148:

The PRIMARY basis for selecting a security control is:

Options:

A.

to achieve the desired level of maturity.


B.

the materiality of the risk.


C.

the ability to mitigate risk.


D.

the cost of the control.


Expert Solution
Questions # 149:

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

Options:

A.

Performing a benchmark analysis and evaluating gaps


B.

Conducting risk assessments and implementing controls


C.

Communicating components of risk and their acceptable levels


D.

Participating in peer reviews and implementing best practices


Expert Solution
Questions # 150:

The PRIMARY objective of testing the effectiveness of a new control before implementation is to:

Options:

A.

ensure that risk is mitigated by the control.


B.

measure efficiency of the control process.


C.

confirm control alignment with business objectives.


D.

comply with the organization's policy.


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 101-150 out of questions