Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 4 out of 12 pages
Viewing questions 151-200 out of questions
Questions # 151:

Which of the following scenarios is MOST important to communicate to senior management?

Options:

A.

Accepted risk scenarios with detailed plans for monitoring


B.

Risk scenarios that have been shared with vendors and third parties


C.

Accepted risk scenarios with impact exceeding the risk tolerance


D.

Risk scenarios that have been identified, assessed, and responded to by the risk owners


Expert Solution
Questions # 152:

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

Options:

A.

detected incidents.


B.

residual risk.


C.

vulnerabilities.


D.

inherent risk.


Expert Solution
Questions # 153:

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

Options:

A.

Conduct risk classification for associated IT controls.


B.

Determine whether risk responses still effectively address risk.


C.

Perform vulnerability and threat assessments.


D.

Analyze and update IT control assessments.


Expert Solution
Questions # 154:

From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?

Options:

A.

Updates align with strategic business objectives.


B.

Updates will be approved by the risk owners.


C.

Updates align with industry standards and benchmarks.


D.

Updates will be reviewed periodically to ensure compliance.


Expert Solution
Questions # 155:

Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?

Options:

A.

Aligning business unit risk responses to organizational priorities


B.

Determining attack likelihood per business unit


C.

Adjusting business unit risk tolerances


D.

Customizing incident response plans for each business unit


Expert Solution
Questions # 156:

For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?

Options:

A.

Temporarily increase the risk threshold.


B.

Suspend processing to investigate the problem.


C.

Initiate a feasibility study for a new application.


D.

Conduct a root-cause analysis.


Expert Solution
Questions # 157:

Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?

Options:

A.

Average bandwidth usage


B.

Peak bandwidth usage


C.

Total bandwidth usage


D.

Bandwidth used during business hours


Expert Solution
Questions # 158:

The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:

Options:

A.

Identify new or emerging risk issues.


B.

Satisfy audit requirements.


C.

Survey and analyze historical risk data.


D.

Understand internal and external threat agents.


Expert Solution
Questions # 159:

After the implementation of a remediation plan, an assessment of associated control design and operating effectiveness can determine the level of:

Options:

A.

residual risk.


B.

aggregated risk.


C.

audit risk.


D.

inherent risk.


Expert Solution
Questions # 160:

An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?

Options:

A.

Conduct a risk assessment.


B.

Update the security strategy.


C.

Implement additional controls.


D.

Update the risk register.


Expert Solution
Questions # 161:

Which of the following is MOST commonly compared against the risk appetite?

Options:

A.

IT risk


B.

Inherent risk


C.

Financial risk


D.

Residual risk


Expert Solution
Questions # 162:

Which of the following BEST confirms the existence and operating effectiveness of information systems controls?

Options:

A.

Self-assessment questionnaires completed by management


B.

Review of internal audit and third-party reports


C.

Management review and sign-off on system documentation


D.

First-hand direct observation of the controls in operation


Expert Solution
Questions # 163:

Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?

Options:

A.

Risk and control self-assessment (CSA) reports


B.

Information generated by the systems


C.

Control environment narratives


D.

Confirmation from industry peers


Expert Solution
Questions # 164:

Which of the following roles is PRIMARILY accountable for risk associated with business information protection?

Options:

A.

Control owner


B.

Data owner


C.

System owner


D.

Application owner


Expert Solution
Questions # 165:

Who should be responsible for approving the cost of controls to be implemented for mitigating risk?

Options:

A.

Risk practitioner


B.

Risk owner


C.

Control owner


D.

Control implementer


Expert Solution
Questions # 166:

Which of the following is the PRIMARY purpose of creating and documenting control procedures?

Options:

A.

To facilitate ongoing audit and control testing


B.

To help manage risk to acceptable tolerance levels


C.

To establish and maintain a control inventory


D.

To increase the likelihood of effective control operation


Expert Solution
Questions # 167:

Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?

Options:

A.

To monitor changes in the risk environment


B.

To provide input to management for the adjustment of risk appetite


C.

To monitor the accuracy of threshold levels in metrics


D.

To obtain business buy-in for investment in risk mitigation measures


Expert Solution
Questions # 168:

It has been observed that a few servers are negatively impacting processing because they are running with less RAM than required by approved security standards. Who should own and drive mitigation of noncompliant platforms?

Options:

A.

Configuration manager


B.

Change manager


C.

Release manager


D.

System owner


Expert Solution
Questions # 169:

when developing IT risk scenarios associated with a new line of business, which of the following would be MOST helpful to review?

Options:

A.

Organizational threats


B.

Resource allocation plan


C.

Competitor analysis


D.

Cost-benefit analysis


Expert Solution
Questions # 170:

Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?

Options:

A.

Avoidance


B.

Acceptance


C.

Mitigation


D.

Transfer


Expert Solution
Questions # 171:

The MOST important reason for implementing change control procedures is to ensure:

Options:

A.

only approved changes are implemented


B.

timely evaluation of change events


C.

an audit trail exists.


D.

that emergency changes are logged.


Expert Solution
Questions # 172:

Which of the following will BEST mitigate the risk associated with IT and business misalignment?

Options:

A.

Establishing business key performance indicators (KPIs)


B.

Introducing an established framework for IT architecture


C.

Establishing key risk indicators (KRIs)


D.

Involving the business process owner in IT strategy


Expert Solution
Questions # 173:

A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?

Options:

A.

Implement new controls.


B.

Recalibrate the key performance indicator (KPI).


C.

Redesign the process.


D.

Re-evaluate the existing control design.


Expert Solution
Questions # 174:

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

Options:

A.

To identify threats introduced by business processes


B.

To identify risk when personal information is collected


C.

To ensure senior management has approved the use of personal information


D.

To ensure compliance with data privacy laws and regulations


Expert Solution
Questions # 175:

A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?

Options:

A.

implement code reviews and Quality assurance on a regular basis


B.

Verity me software agreement indemnifies the company from losses


C.

Review the source coda and error reporting of the application


D.

Update the software with the latest patches and updates


Expert Solution
Questions # 176:

Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors

Options:

A.

Frequency of business continuity plan (BCP) lasting


B.

Frequency and number of new software releases


C.

Frequency and duration of unplanned downtime


D.

Number of IT support staff available after business hours


Expert Solution
Questions # 177:

A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:

Options:

A.

ensure suitable insurance coverage is purchased.


B.

negotiate with the risk owner on control efficiency.


C.

reassess the risk to confirm the impact.


D.

obtain approval from senior management.


Expert Solution
Questions # 178:

Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?

Options:

A.

Use an encrypted tunnel lo connect to the cloud.


B.

Encrypt the data in the cloud database.


C.

Encrypt physical hard drives within the cloud.


D.

Encrypt data before it leaves the organization.


Expert Solution
Questions # 179:

A recent big data project has resulted in the creation of an application used to support important investment decisions. Which of the following should be of GREATEST concern to the risk practitioner?

Options:

A.

Data quality


B.

Maintenance costs


C.

Data redundancy


D.

System integration


Expert Solution
Questions # 180:

An organization ' s chief information officer (CIO) has proposed investing in a new. untested technology to take advantage of being first to market Senior management has concerns about the success of the project and has set a limit for expenditures before final approval. This conditional approval indicates the organization ' s risk:

Options:

A.

capacity.


B.

appetite.


C.

management capability.


D.

treatment strategy.


Expert Solution
Questions # 181:

A process maturity model is MOST useful to the risk management process because it helps:

Options:

A.

determine the cost of control improvements


B.

determine the gap between actual and desired state.


C.

benchmark maturity against industry standards


D.

reduce audit and regulatory findings


Expert Solution
Questions # 182:

Which of the following stakeholders define risk tolerance for an enterprise?

Options:

A.

IT compliance and IT audit


B.

Regulators and shareholders


C.

The board and executive management


D.

Enterprise risk management (ERM)


Expert Solution
Questions # 183:

Which of the following would require updates to an organization ' s IT risk register?

Options:

A.

Discovery of an ineffectively designed key IT control


B.

Management review of key risk indicators (KRls)


C.

Changes to the team responsible for maintaining the register


D.

Completion of the latest internal audit


Expert Solution
Questions # 184:

When evaluating enterprise IT risk management it is MOST important to:

Options:

A.

create new control processes to reduce identified IT risk scenarios


B.

confirm the organization’s risk appetite and tolerance


C.

report identified IT risk scenarios to senior management


D.

review alignment with the organization ' s investment plan


Expert Solution
Questions # 185:

Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?

Options:

A.

Percentage of legacy servers out of support


B.

Percentage of severs receiving automata patches


C.

Number of unpremeditated vulnerabilities


D.

Number of intrusion attempts


Expert Solution
Questions # 186:

What would be the MAIN concern associated with a decentralized IT function maintaining multiple risk registers?

Options:

A.

Risk treatment efforts within the IT function may overlap one another.


B.

Duplicate IT risk scenarios may be documented across the organization.


C.

Aggregate risk within the IT function may exceed the organization ' s appetite.


D.

Related IT risk scenarios in the IT function may be updated at different times.


Expert Solution
Questions # 187:

An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?

Options:

A.

Risk mitigation


B.

Risk avoidance


C.

Risk acceptance


D.

Risk transfer


Expert Solution
Questions # 188:

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

Options:

A.

Weak governance structures


B.

Senior management scrutiny


C.

Complex regulatory environment


D.

Unclear reporting relationships


Expert Solution
Questions # 189:

Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?

Options:

A.

An annual contract review


B.

A service level agreement (SLA)


C.

A requirement to adopt an established risk management framework


D.

A requirement to provide an independent audit report


Expert Solution
Questions # 190:

An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?

Options:

A.

Number of claims affected by the user requirements


B.

Number of customers impacted


C.

Impact to the accuracy of claim calculation


D.

Level of resources required to implement the user requirements


Expert Solution
Questions # 191:

An organization has implemented a policy requiring staff members to take a minimum of five consecutive days ' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?

Options:

A.

Percentage of staff turnover following five consecutive days of leave


B.

Average number of consecutive days of leave per staff member


C.

Number of suspected malicious activities reported since policy implementation


D.

Financial loss incurred due to malicious activities since policy implementation


Expert Solution
Questions # 192:

Which of the following is MOST helpful to understand the consequences of an IT risk event?

Options:

A.

Fault tree analysis


B.

Historical trend analysis


C.

Root cause analysis


D.

Business impact analysis (BIA)


Expert Solution
Questions # 193:

Which of the following is MOST influential when management makes risk response decisions?

Options:

A.

Risk appetite


B.

Audit risk


C.

Residual risk


D.

Detection risk


Expert Solution
Questions # 194:

Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?

Options:

A.

It provides a cost-benefit analysis on control options available for implementation.


B.

It provides a view on where controls should be applied to maximize the uptime of servers.


C.

It provides historical information about the impact of individual servers malfunctioning.


D.

It provides a comprehensive view of the impact should the servers simultaneously fail.


Expert Solution
Questions # 195:

An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?

Options:

A.

Identify systems that are vulnerable to being exploited by the attack.


B.

Confirm with the antivirus solution vendor whether the next update will detect the attack.


C.

Verify the data backup process and confirm which backups are the most recent ones available.


D.

Obtain approval for funding to purchase a cyber insurance plan.


Expert Solution
Questions # 196:

What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?

Options:

A.

Creating metrics to report the number of security incidents


B.

Hiring subject matter experts for the program


C.

Establishing a budget for additional resources


D.

Assigning clear ownership of the program


Expert Solution
Questions # 197:

Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?

Options:

A.

Digital signatures


B.

Encrypted passwords


C.

One-time passwords


D.

Digital certificates


Expert Solution
Questions # 198:

The MOST important reason to monitor key risk indicators (KRIs) is to help management:

Options:

A.

identity early risk transfer strategies.


B.

lessen the impact of realized risk.


C.

analyze the chain of risk events.


D.

identify the root cause of risk events.


Expert Solution
Questions # 199:

An organization is planning to implement a Zero Trust model. From a cybersecunty perspective, which of the following is MOST important to ensure successful alignment with the overall inten Zero Trust?

Options:

A.

Access policies


B.

Industry benchmarks


C.

Network compatibility


D.

Encryption algorithms


Expert Solution
Questions # 200:

Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management ' s risk appetite?

Options:

A.

Risk management budget


B.

Risk management industry trends


C.

Risk tolerance


D.

Risk capacity


Expert Solution
Viewing page 4 out of 12 pages
Viewing questions 151-200 out of questions