Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 4 out of 11 pages
Viewing questions 151-200 out of questions
Questions # 151:

Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?

Options:

A.

Some critical business applications are not included in the plan


B.

Several recovery activities will be outsourced


C.

The plan is not based on an internationally recognized framework


D.

The chief information security officer (CISO) has not approved the plan


Expert Solution
Questions # 152:

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

Options:

A.

Implement a tool to create and distribute violation reports


B.

Raise awareness of encryption requirements for sensitive data.


C.

Block unencrypted outgoing emails which contain sensitive data.


D.

Implement a progressive disciplinary process for email violations.


Expert Solution
Questions # 153:

Which of the following is the MOST essential characteristic of a good IT risk scenario?

Options:

A.

The scenario is aligned to business control processes.


B.

The scenario is aligned to the organization’s risk appetite and tolerance.


C.

The scenario is aligned to a business objective.


D.

The scenario is aligned to known vulnerabilities in information technology.


Expert Solution
Questions # 154:

Which of the following is the GREATEST concern associated with redundant data in an organization's inventory system?

Options:

A.

Poor access control


B.

Unnecessary data storage usage


C.

Data inconsistency


D.

Unnecessary costs of program changes


Expert Solution
Questions # 155:

Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?

Options:

A.

A comparison of the costs of notice and consent control options


B.

Examples of regulatory fines incurred by industry peers for noncompliance


C.

A report of critical controls showing the importance of notice and consent


D.

A cost-benefit analysis of the control versus probable legal action


Expert Solution
Questions # 156:

Which of the following would be MOST useful to management when allocating resources to mitigate risk to the organization?

Options:

A.

Risk assessments


B.

Control self-assessments (CSAs)


C.

Risk-based audits


D.

Vulnerability analysis


Expert Solution
Questions # 157:

Who is accountable for risk treatment?

Options:

A.

Enterprise risk management team


B.

Risk mitigation manager


C.

Business process owner


D.

Risk owner


Expert Solution
Questions # 158:

Which of the following is MOST important to the integrity of a security log?

Options:

A.

Least privilege access


B.

Inability to edit


C.

Ability to overwrite


D.

Encryption


Expert Solution
Questions # 159:

Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?

Options:

A.

Testing the transmission of credit card numbers


B.

Reviewing logs for unauthorized data transfers


C.

Configuring the DLP control to block credit card numbers


D.

Testing the DLP rule change control process


Expert Solution
Questions # 160:

Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?

Options:

A.

Risk tolerance


B.

Risk appetite


C.

Risk sensitivity


D.

Risk velocity


Expert Solution
Questions # 161:

An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?

Options:

A.

Risk tolerance


B.

Risk appetite


C.

Inherent risk


D.

Residual risk


Expert Solution
Questions # 162:

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

Options:

A.

Balanced scorecard


B.

Risk appetite


C.

Risk map


D.

Risk events


Expert Solution
Questions # 163:

From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?

Options:

A.

To reduce incident response times defined in SLAs


B.

To satisfy senior management expectations for incident response


C.

To ensure risk has been reduced to acceptable levels


D.

To minimize the likelihood of future occurrences


Expert Solution
Questions # 164:

Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk

awareness program?

Options:

A.

Policies and procedures


B.

Structure and culture


C.

Key risk indicators (KRIs) and thresholds


D.

Known threats and vulnerabilities


Expert Solution
Questions # 165:

The PRIMARY purpose of a maturity model is to compare the:

Options:

A.

current state of key processes to their desired state.


B.

actual KPIs with target KPIs.


C.

organization to industry best practices.


D.

organization to peers.


Expert Solution
Questions # 166:

Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?

Options:

A.

Third line of defense


B.

Line of defense subject matter experts


C.

Second line of defense


D.

First line of defense


Expert Solution
Questions # 167:

A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?

Options:

A.

Business continuity director


B.

Disaster recovery manager


C.

Business application owner


D.

Data center manager


Expert Solution
Questions # 168:

When reviewing a risk response strategy, senior management's PRIMARY focus should be placed on the:

Options:

A.

cost-benefit analysis.


B.

investment portfolio.


C.

key performance indicators (KPIs).


D.

alignment with risk appetite.


Expert Solution
Questions # 169:

Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?

Options:

A.

Providing oversight of risk management processes


B.

Implementing processes to detect and deter fraud


C.

Ensuring that risk and control assessments consider fraud


D.

Monitoring the results of actions taken to mitigate fraud


Expert Solution
Questions # 170:

A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?

Options:

A.

Use of a non-production environment


B.

Regular security updates


C.

Third-party management plan


D.

Adequate vendor support


Expert Solution
Questions # 171:

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?

Options:

A.

Network monitoring infrastructure


B.

Centralized vulnerability management


C.

Incident management process


D.

Centralized log management


Expert Solution
Questions # 172:

Which of the following is MOST important to identify when developing generic risk scenarios?

Options:

A.

The organization’s vision and mission


B.

Resources required for risk mitigation


C.

Impact to business objectives


D.

Risk-related trends within the industry


Expert Solution
Questions # 173:

When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?

Options:

A.

Users may share accounts with business system analyst


B.

Application may not capture a complete audit trail.


C.

Users may be able to circumvent application controls.


D.

Multiple connects to the database are used and slow the process


Expert Solution
Questions # 174:

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

Options:

A.

Transborder data transfer restrictions


B.

Differences in regional standards


C.

Lack of monitoring over vendor activities


D.

Lack of after-hours incident management support


Expert Solution
Questions # 175:

Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?

Options:

A.

Risk taxonomy


B.

Risk response


C.

Risk appetite


D.

Risk ranking


Expert Solution
Questions # 176:

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

Options:

A.

The methodology used to perform the risk assessment


B.

Action plans to address risk scenarios requiring treatment


C.

Date and status of the last project milestone


D.

The individuals assigned ownership of controls


Expert Solution
Questions # 177:

Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?

Options:

A.

internal audit recommendations


B.

Laws and regulations


C.

Policies and procedures


D.

Standards and frameworks


Expert Solution
Questions # 178:

Prudent business practice requires that risk appetite not exceed:

Options:

A.

inherent risk.


B.

risk tolerance.


C.

risk capacity.


D.

residual risk.


Expert Solution
Questions # 179:

Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?

Options:

A.

Vendor's information security officer


B.

Customer's data privacy officer


C.

Customer's data owner


D.

Vendor's application owner


Expert Solution
Questions # 180:

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

Options:

A.

Developing contingency plans for key processes


B.

Implementing key performance indicators (KPIs)


C.

Adding risk triggers to entries in the risk register


D.

Establishing a series of key risk indicators (KRIs)


Expert Solution
Questions # 181:

When prioritizing risk response, management should FIRST:

Options:

A.

evaluate the organization s ability and expertise to implement the solution.


B.

evaluate the risk response of similar organizations.


C.

address high risk factors that have efficient and effective solutions.


D.

determine which risk factors have high remediation costs


Expert Solution
Questions # 182:

A new international data privacy regulation requires personal data to be

disposed after the specified retention period, which is different from the local

regulatory requirement. Which of the following is the risk practitioner's

BEST course of action?

Options:

A.

The application code has not been version controlled.


B.

Knowledge of the applications is limited to few employees.


C.

An IT project manager is not assigned to oversee development.


D.

Controls are not applied to the applications.


Expert Solution
Questions # 183:

Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?

Options:

A.

Testing in a non-production environment


B.

Performing a security control review


C.

Reviewing the security audit report


D.

Conducting a risk assessment


Expert Solution
Questions # 184:

Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:

Options:

A.

accountable for the affected processes.


B.

members of senior management.


C.

authorized to select risk mitigation options.


D.

independent from the business operations.


Expert Solution
Questions # 185:

The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:

Options:

A.

serve as a basis for measuring risk appetite.


B.

align with the organization's risk profile.


C.

provide a warning of emerging high-risk conditions.


D.

provide data for updating the risk register.


Expert Solution
Questions # 186:

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

Options:

A.

Limited blockchain adoption and support


B.

Reduced transaction speed and system responsiveness


C.

Reduced network integrity and availability


D.

Limited integration with external systems and blockchains


Expert Solution
Questions # 187:

A business unit has implemented robotic process automation (RPA) for its

repetitive back-office tasks. Which of the following should be the risk

practitioner's GREATEST concern?

Options:

A.

The security team is unaware of the implementation.


B.

The organization may lose institutional knowledge.


C.

The robots may fail to work effectively.


D.

Virtual clients are used for implementation.


Expert Solution
Questions # 188:

Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?

Options:

A.

Prioritize risk response options


B.

Reduce likelihood.


C.

Address more than one risk response


D.

Reduce impact


Expert Solution
Questions # 189:

Who should be accountable for ensuring effective cybersecurity controls are established?

Options:

A.

Risk owner


B.

Security management function


C.

IT management


D.

Enterprise risk function


Expert Solution
Questions # 190:

Which of the following provides a risk practitioner with the MOST reliable evidence of a third party's ability to protect the confidentiality of sensitive corporate information?

Options:

A.

A signed nondisclosure agreement (NDA)


B.

Control self-assessment (CSA) results


C.

External audit reports


D.

Internal audit reports


Expert Solution
Questions # 191:

When classifying and prioritizing risk responses, the areas to address FIRST are those with:

Options:

A.

low cost effectiveness ratios and high risk levels


B.

high cost effectiveness ratios and low risk levels.


C.

high cost effectiveness ratios and high risk levels


D.

low cost effectiveness ratios and low risk levels.


Expert Solution
Questions # 192:

A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:

Options:

A.

ensure suitable insurance coverage is purchased.


B.

negotiate with the risk owner on control efficiency.


C.

reassess the risk to confirm the impact.


D.

obtain approval from senior management.


Expert Solution
Questions # 193:

Following a review of a third-party vendor, it is MOST important for an organization to ensure:

Options:

A.

results of the review are accurately reported to management.


B.

identified findings are reviewed by the organization.


C.

results of the review are validated by internal audit.


D.

identified findings are approved by the vendor.


Expert Solution
Questions # 194:

A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?

Options:

A.

An increase in attempted distributed denial of service (DDoS) attacks


B.

An increase in attempted website phishing attacks


C.

A decrease in achievement of service level agreements (SLAs)


D.

A decrease in remediated web security vulnerabilities


Expert Solution
Questions # 195:

The MOST effective approach to prioritize risk scenarios is by:

Options:

A.

assessing impact to the strategic plan.


B.

aligning with industry best practices.


C.

soliciting input from risk management experts.


D.

evaluating the cost of risk response.


Expert Solution
Questions # 196:

Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?

Options:

A.

Threat to IT


B.

Number of control failures


C.

Impact on business


D.

Risk ownership


Expert Solution
Questions # 197:

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

Options:

A.

Third-party data custodian


B.

Data custodian


C.

Regional office executive


D.

Data owner


Expert Solution
Questions # 198:

The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:

Options:

A.

risk is treated appropriately


B.

mitigating actions are prioritized


C.

risk entries are regularly updated


D.

risk exposure is minimized.


Expert Solution
Questions # 199:

An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?

Options:

A.

Prepare a cost-benefit analysis to evaluate relocation.


B.

Prepare a disaster recovery plan (DRP).


C.

Conduct a business impact analysis (BIA) for an alternate location.


D.

Develop a business continuity plan (BCP).


Expert Solution
Questions # 200:

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

Options:

A.

Logs and system events


B.

Intrusion detection system (IDS) rules


C.

Vulnerability assessment reports


D.

Penetration test reports


Expert Solution
Viewing page 4 out of 11 pages
Viewing questions 151-200 out of questions