Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 151-200 out of questions
Questions # 151:

Which of the following BEST supports ethical IT risk management practices?

Options:

A.

Robust organizational communication channels


B.

Mapping of key risk indicators (KRIs) to corporate strategy


C.

Capability maturity models integrated with risk management frameworks


D.

Rigorously enforced operational service level agreements (SLAs)


Expert Solution
Questions # 152:

An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:

Options:

A.

Avoidance


B.

Mitigation


C.

Transfer


D.

Acceptance


Expert Solution
Questions # 153:

A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

Business application owner


B.

Business continuity manager


C.

Chief risk officer (CRO)


D.

IT infrastructure manager


Expert Solution
Questions # 154:

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

Options:

A.

Risk analysis results


B.

Exception handling policy


C.

Vulnerability assessment results


D.

Benchmarking assessments


Expert Solution
Questions # 155:

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

Options:

A.

ensuring controls are operating efficiently and facilitating productivity.


B.

enabling senior leadership to better understand the level of risk the organization is facing.


C.

monitoring changes in the likelihood of adverse events due to ineffective controls.


D.

providing information on the degree to which controls are meeting intended objectives.


Expert Solution
Questions # 156:

It is MOST important that entries in an organization’s risk register be updated:

Options:

A.

when the key risk indicator (KRI) threshold has been reached.


B.

when required by internal audit.


C.

prior to a risk review.


D.

when aspects of the risk scenario change.


Expert Solution
Questions # 157:

What is the MAIN benefit of using a top-down approach to develop risk scenarios?

Options:

A.

It describes risk events specific to technology used by the enterprise.


B.

It establishes the relationship between risk events and organizational objectives.


C.

It uses hypothetical and generic risk events specific to the enterprise.


D.

It helps management and the risk practitioner to refine risk scenarios.


Expert Solution
Questions # 158:

Which of the following trends would cause the GREATEST concern regarding the effectiveness of an organization's user access control processes? An increase in the:

Options:

A.

ratio of disabled to active user accounts.


B.

percentage of users with multiple user accounts.


C.

average number of access entitlements per user account.


D.

average time between user transfers and access updates.


Expert Solution
Questions # 159:

Which of the following is MOST important to the integrity of a security log?

Options:

A.

Least privilege access


B.

Inability to edit


C.

Ability to overwrite


D.

Encryption


Expert Solution
Questions # 160:

A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:

Options:

A.

validating whether critical IT risk has been addressed.


B.

assigning accountability for IT risk to business functions.


C.

identifying IT assets that support key business processes.


D.

defining the requirements for an IT risk-aware culture


Expert Solution
Questions # 161:

Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?

Options:

A.

Significant increases in risk mitigation budgets


B.

Large fluctuations in risk ratings between assessments


C.

A steady increase in the time to recover from incidents


D.

A large number of control exceptions


Expert Solution
Questions # 162:

A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?

Options:

A.

The contingency plan provides for backup media to be taken to the alternative site.


B.

The contingency plan for high priority applications does not involve a shared cold site.


C.

The alternative site is a hot site with equipment ready to resume processing immediately.


D.

The alternative site does not reside on the same fault no matter how far the distance apart.


Expert Solution
Questions # 163:

Which of the following activities is a responsibility of the second line of defense?

Options:

A.

Challenging risk decision making


B.

Developing controls to manage risk scenarios


C.

Implementing risk response plans


D.

Establishing organizational risk appetite


Expert Solution
Questions # 164:

When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?

Options:

A.

a identity conditions that may cause disruptions


B.

Review incident response procedures


C.

Evaluate the probability of risk events


D.

Define metrics for restoring availability


Expert Solution
Questions # 165:

A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?

Options:

A.

Threats are not being detected.


B.

Multiple corporate build images exist.


C.

The IT build process was not followed.


D.

The process documentation was not updated.


Expert Solution
Questions # 166:

Which of the following should be done FIRST when developing a data protection management plan?

Options:

A.

Perform a cost-benefit analysis.


B.

Identify critical data.


C.

Establish a data inventory.


D.

Conduct a risk analysis.


Expert Solution
Questions # 167:

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

Options:

A.

Absorb the loss in productivity.


B.

Request a waiver to the requirements.


C.

Escalate the issue to senior management


D.

Remove the control to accommodate business objectives.


Expert Solution
Questions # 168:

During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:

Options:

A.

Interviewing data owners


B.

Reviewing risk response plans with internal audit


C.

Developing a risk monitoring process


D.

Reviewing an external risk assessment


Expert Solution
Questions # 169:

In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?

Options:

A.

Implementation


B.

Development


C.

Design


D.

Feasibility


Expert Solution
Questions # 170:

Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?

Options:

A.

Threat to IT


B.

Number of control failures


C.

Impact on business


D.

Risk ownership


Expert Solution
Questions # 171:

An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Report the observation to the chief risk officer (CRO).


B.

Validate the adequacy of the implemented risk mitigation measures.


C.

Update the risk register with the implemented risk mitigation actions.


D.

Revert the implemented mitigation measures until approval is obtained


Expert Solution
Questions # 172:

It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:

Options:

A.

perform a business impact analysis.


B.

identify potential sources of risk.


C.

establish risk guidelines.


D.

understand control design.


Expert Solution
Questions # 173:

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

Options:

A.

Educating employees on what needs to be kept confidential


B.

Implementing a data loss prevention (DLP) solution


C.

Taking punitive action against employees who expose confidential data


D.

Requiring employees to sign nondisclosure agreements


Expert Solution
Questions # 174:

Which of the following will BEST support management repotting on risk?

Options:

A.

Risk policy requirements


B.

A risk register


C.

Control self-assessment


D.

Key performance Indicators


Expert Solution
Questions # 175:

Of the following, who should be responsible for determining the inherent risk rating of an application?

Options:

A.

Application owner


B.

Senior management


C.

Risk practitioner


D.

Business process owner


Expert Solution
Questions # 176:

From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?

Options:

A.

To reduce incident response times defined in SLAs


B.

To satisfy senior management expectations for incident response


C.

To ensure risk has been reduced to acceptable levels


D.

To minimize the likelihood of future occurrences


Expert Solution
Questions # 177:

Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?

Options:

A.

Occurrences of specific events


B.

A performance measurement


C.

The risk tolerance level


D.

Risk scenarios


Expert Solution
Questions # 178:

Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?

Options:

A.

Applying risk treatments


B.

Implementing internal controls


C.

Monitoring risk responses


D.

Providing assurance of control effectiveness


Expert Solution
Questions # 179:

Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?

Options:

A.

Costs and benefits


B.

Local laws and regulations


C.

Security features and support


D.

Business strategies and needs


Expert Solution
Questions # 180:

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

Options:

A.

Balanced scorecard


B.

Capability maturity level


C.

Internal audit plan


D.

Control self-assessment (CSA)


Expert Solution
Questions # 181:

In which of the following scenarios would a risk practitioner be required to provide the MOST justification for a risk assessment?

Options:

A.

Modeling a threat-based risk event


B.

Calculating mean time between failures (MTBF)


C.

Using a semi-quantitative approach


D.

Calculating adjusted loss expectancy (ALE)


Expert Solution
Questions # 182:

To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority'?

Options:

A.

Local authorities and regulators


B.

Ethics and compliance team


C.

Senior management


D.

Internal audit team


Expert Solution
Questions # 183:

Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?

Options:

A.

The number of stakeholders involved in IT risk identification workshops


B.

The percentage of corporate budget allocated to IT risk activities


C.

The percentage of incidents presented to the board


D.

The number of executives attending IT security awareness training


Expert Solution
Questions # 184:

Which of the following will be the GREATEST concern when assessing the risk profile of an organization?

Options:

A.

The risk profile was not updated after a recent incident


B.

The risk profile was developed without using industry standards.


C.

The risk profile was last reviewed two years ago.


D.

The risk profile does not contain historical loss data.


Expert Solution
Questions # 185:

Which of the following is the BEST approach for determining whether a risk action plan is effective?

Options:

A.

Comparing the remediation cost against budget


B.

Assessing changes in residual risk


C.

Assessing the inherent risk


D.

Monitoring changes of key performance indicators(KPIs)


Expert Solution
Questions # 186:

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

Options:

A.

Standard operating procedures


B.

SWOT analysis


C.

Industry benchmarking


D.

Control gap analysis


Expert Solution
Questions # 187:

Which of the following is the MOST important driver of an effective enterprise risk management (ERM) program?

Options:

A.

Risk policy


B.

Risk committee


C.

Risk culture


D.

Risk management plan


Expert Solution
Questions # 188:

Which of the following is MOST important to the successful development of IT risk scenarios?

Options:

A.

Cost-benefit analysis


B.

Internal and external audit reports


C.

Threat and vulnerability analysis


D.

Control effectiveness assessment


Expert Solution
Questions # 189:

Which of the following is the BEST way to support communication of emerging risk?

Options:

A.

Update residual risk levels to reflect the expected risk impact.


B.

Adjust inherent risk levels upward.


C.

Include it on the next enterprise risk committee agenda.


D.

Include it in the risk register for ongoing monitoring.


Expert Solution
Questions # 190:

Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?

Options:

A.

Senior management has approved the control design.


B.

Inherent risk has been reduced from original levels.


C.

Residual risk remains within acceptable levels.


D.

Costs for control maintenance are reasonable.


Expert Solution
Questions # 191:

After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

Options:

A.

A decrease in threats


B.

A change in the risk profile


C.

An increase in reported vulnerabilities


D.

An increase in identified risk scenarios


Expert Solution
Questions # 192:

An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?

Options:

A.

Risk scenarios


B.

Risk ownership


C.

Risk impact


D.

Risk likelihood


Expert Solution
Questions # 193:

When developing IT risk scenarios, it is MOST important to consider:

Options:

A.

The industry's threat profile.


B.

Incidents occurring at similar organizations.


C.

System performance thresholds.


D.

Organizational objectives.


Expert Solution
Questions # 194:

A new international data privacy regulation requires personal data to be

disposed after the specified retention period, which is different from the local

regulatory requirement. Which of the following is the risk practitioner's

BEST course of action?

Options:

A.

The application code has not been version controlled.


B.

Knowledge of the applications is limited to few employees.


C.

An IT project manager is not assigned to oversee development.


D.

Controls are not applied to the applications.


Expert Solution
Questions # 195:

Which of the following situations would BEST justify escalation to senior management?

Options:

A.

Residual risk exceeds acceptable limits.


B.

Residual risk is inadequately recorded.


C.

Residual risk remains after controls have been applied.


D.

Residual risk equals current risk.


Expert Solution
Questions # 196:

A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?

Options:

A.

Increase in compliance breaches


B.

Increase in loss event impact


C.

Increase in residual risk


D.

Increase in customer complaints


Expert Solution
Questions # 197:

Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?

Options:

A.

IT management


B.

Internal audit


C.

Process owners


D.

Senior management


Expert Solution
Questions # 198:

Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?

Options:

A.

Aligning IT with short-term and long-term goals of the organization


B.

Ensuring the IT budget and resources focus on risk management


C.

Ensuring senior management's primary focus is on the impact of identified risk


D.

Prioritizing internal departments that provide service to customers


Expert Solution
Questions # 199:

Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?

Options:

A.

Insurance coverage


B.

Onsite replacement availability


C.

Maintenance procedures


D.

Installation manuals


Expert Solution
Questions # 200:

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

Options:

A.

The program has not decreased threat counts.


B.

The program has not considered business impact.


C.

The program has been significantly revised


D.

The program uses non-customized training modules.


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 151-200 out of questions