Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 5 out of 12 pages
Viewing questions 201-250 out of questions
Questions # 201:

Which of the following BEST enables senior management to make risk treatment decisions in line with the organization ' s risk appetite?

Options:

A.

Quantitative risk analysis


B.

Industry risk benchmarks


C.

Risk scenarios


D.

Risk remediation plans


Expert Solution
Questions # 202:

Optimized risk management is achieved when risk is reduced:

Options:

A.

with strategic initiatives.


B.

to meet risk appetite.


C.

within resource availability.


D.

below risk appetite.


Expert Solution
Questions # 203:

Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?

Options:

A.

Use production data in a non-production environment


B.

Use masked data in a non-production environment


C.

Use test data in a production environment


D.

Use anonymized data in a non-production environment


Expert Solution
Questions # 204:

A risk practitioner has been asked to mark an identified control deficiency as remediated, despite concerns that the risk level is still too high. Which of the following is the BEST way to address this concern?

Options:

A.

Prepare a risk acceptance proposal for senior management ' s consideration.


B.

Review the organization ' s risk appetite and tolerance.


C.

Assess the residual risk against the organization ' s risk appetite.


D.

Recommend implementation of additional compensating controls.


Expert Solution
Questions # 205:

Who is accountable for the process when an IT stakeholder operates a key control to address a risk scenario?

Options:

A.

Data custodian


B.

Risk owner


C.

System owner


D.

IT manager


Expert Solution
Questions # 206:

Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?

Options:

A.

Total cost to support the policy


B.

Number of exceptions to the policy


C.

Total cost of policy breaches


D.

Number of inquiries regarding the policy


Expert Solution
Questions # 207:

When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?

Options:

A.

Risk management strategy planning


B.

Risk monitoring and control


C.

Risk identification


D.

Risk response planning


Expert Solution
Questions # 208:

Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?

Options:

A.

Perform a gap analysis.


B.

Prioritize impact to the business units.


C.

Perform a risk assessment.


D.

Review the risk tolerance and appetite.


Expert Solution
Questions # 209:

An organization ' s stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

Options:

A.

Escalate to senior management.


B.

Identify a risk transfer option.


C.

Reassess risk scenarios.


D.

Benchmark with similar industries.


Expert Solution
Questions # 210:

Which of the following would prompt changes in key risk indicator {KRI) thresholds?

Options:

A.

Changes to the risk register


B.

Changes in risk appetite or tolerance


C.

Modification to risk categories


D.

Knowledge of new and emerging threats


Expert Solution
Questions # 211:

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

Options:

A.

Evaluating gaps in the on-premise and cloud security profiles


B.

Establishing minimum cloud security requirements


C.

Enforcing compliance with cloud security parameters


D.

Educating IT staff on variances between on premise and cloud security


Expert Solution
Questions # 212:

When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:

Options:

A.

cost-benefit analysis.


B.

risk appetite.


C.

regulatory guidelines


D.

control efficiency


Expert Solution
Questions # 213:

Which of the following is the MOST useful information for prioritizing risk mitigation?

Options:

A.

Cost of risk mitigation


B.

Asset criticality


C.

Acceptable risk level


D.

Business impact assessment


Expert Solution
Questions # 214:

Which of the following is BEST measured by key control indicators (KCIs)?

Options:

A.

Historical trends of the organizational risk profile


B.

Cost efficiency of risk treatment plan projects


C.

Comprehensiveness of risk assessment procedures


D.

Effectiveness of organizational defense in depth


Expert Solution
Questions # 215:

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

Options:

A.

Cost of offsite backup premises


B.

Cost of downtime due to a disaster


C.

Cost of testing the business continuity plan


D.

Response time of the emergency action plan


Expert Solution
Questions # 216:

What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?

Options:

A.

Use the severity rating to calculate risk.


B.

Classify the risk scenario as low-probability.


C.

Use the highest likelihood identified by risk management.


D.

Rely on range-based estimates provided by subject-matter experts.


Expert Solution
Questions # 217:

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

Options:

A.

To deliver projects on time and on budget


B.

To assess inherent risk


C.

To include project risk in the enterprise-wide IT risk profit.


D.

To assess risk throughout the project


Expert Solution
Questions # 218:

Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?

Options:

A.

Senior management demonstrates ethics in their day-to-day decision making.


B.

An independent ethics investigation team has been established.


C.

Employees are required to complete ethics training courses annually.


D.

The risk practitioner is required to consult with the ethics committee.


Expert Solution
Questions # 219:

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

Options:

A.

Initiate disciplinary action against the risk owner.


B.

Reassess the risk and review the underlying controls.


C.

Review organizational ethics policies.


D.

Report the activity to the supervisor.


Expert Solution
Questions # 220:

Which of the following is MOST important for an organization to consider when developing its IT strategy?

Options:

A.

IT goals and objectives


B.

Organizational goals and objectives


C.

The organization ' s risk appetite statement


D.

Legal and regulatory requirements


Expert Solution
Questions # 221:

The MOST effective approach to prioritize risk scenarios is by:

Options:

A.

assessing impact to the strategic plan.


B.

aligning with industry best practices.


C.

soliciting input from risk management experts.


D.

evaluating the cost of risk response.


Expert Solution
Questions # 222:

Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?

Options:

A.

Encrypted storage of data


B.

Links to source data


C.

Audit trails for updates and deletions


D.

Check totals on data records and data fields


Expert Solution
Questions # 223:

Risk management strategies are PRIMARILY adopted to:

Options:

A.

take necessary precautions for claims and losses.


B.

achieve acceptable residual risk levels.


C.

avoid risk for business and IT assets.


D.

achieve compliance with legal requirements.


Expert Solution
Questions # 224:

Which of the following BEST assists in justifying an investment in automated controls?

Options:

A.

Cost-benefit analysis


B.

Alignment of investment with risk appetite


C.

Elimination of compensating controls


D.

Reduction in personnel costs


Expert Solution
Questions # 225:

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

Options:

A.

Perform annual risk assessments.


B.

Interview process owners.


C.

Review the risk register.


D.

Analyze key performance indicators (KPIs).


Expert Solution
Questions # 226:

Which of the following approaches would BEST help to identify relevant risk scenarios?

Options:

A.

Engage line management in risk assessment workshops.


B.

Escalate the situation to risk leadership.


C.

Engage internal audit for risk assessment workshops.


D.

Review system and process documentation.


Expert Solution
Questions # 227:

Which of the following BEST enforces access control for an organization that uses multiple cloud technologies?

Options:

A.

Senior management support of cloud adoption strategies


B.

Creation of a cloud access risk management policy


C.

Adoption of a cloud access security broker (CASB) solution


D.

Expansion of security information and event management (SIEM) to cloud services


Expert Solution
Questions # 228:

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?

Options:

A.

Better understanding of the risk appetite


B.

Improving audit results


C.

Enabling risk-based decision making


D.

Increasing process control efficiencies


Expert Solution
Questions # 229:

Which of the following is the MOST relevant information to include in a risk management strategy?

Options:

A.

Quantified risk triggers


B.

Cost of controls


C.

Regulatory requirements


D.

Organizational goals


Expert Solution
Questions # 230:

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

Options:

A.

Approval by senior management


B.

Low cost of development and maintenance


C.

Sensitivity to changes in risk levels


D.

Use of industry risk data sources


Expert Solution
Questions # 231:

An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?

Options:

A.

Redesign the heat map.


B.

Review the risk tolerance.


C.

Perform a business impact analysis (BIA)


D.

Update the risk register.


Expert Solution
Questions # 232:

Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?

Options:

A.

Communicate potential impact to decision makers.


B.

Research the root cause of similar incidents.


C.

Verify the response plan is adequate.


D.

Increase human resources to respond in the interim.


Expert Solution
Questions # 233:

Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?

Options:

A.

Building an organizational risk profile after updating the risk register


B.

Ensuring risk owners participate in a periodic control testing process


C.

Designing a process for risk owners to periodically review identified risk


D.

Implementing a process for ongoing monitoring of control effectiveness


Expert Solution
Questions # 234:

Following the identification of a risk associated with a major organizational change, which of the following is MOST important to update in the IT risk register?

Options:

A.

The risk owner


B.

The person who identified the risk


C.

The control owner


D.

The risk response owner


Expert Solution
Questions # 235:

A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:

Options:

A.

mitigation plans for threat events should be prepared in the current planning period.


B.

this risk scenario is equivalent to more frequent but lower impact risk scenarios.


C.

the current level of risk is within tolerance.


D.

an increase in threat events could cause a loss sooner than anticipated.


Expert Solution
Questions # 236:

Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?

Options:

A.

Temporarily mitigate the OS vulnerabilities


B.

Document and implement a patching process


C.

Evaluate permanent fixes such as patches and upgrades


D.

Identify the vulnerabilities and applicable OS patches


Expert Solution
Questions # 237:

Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?

Options:

A.

Changes in the organization ' s risk appetite and risk tolerance levels


B.

Impact due to changes in external and internal risk factors


C.

Changes in residual risk levels against acceptable levels


D.

Gaps in best practices and implemented controls across the industry


Expert Solution
Questions # 238:

Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?

Options:

A.

The cost associated with incident response activitiesThe composition and number of records in the information asset


B.

The maximum levels of applicable regulatory fines


C.

The length of time between identification and containment of the incident


Expert Solution
Questions # 239:

An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?

Options:

A.

IT infrastructure head


B.

Human resources head


C.

Supplier management head


D.

Application development head


Expert Solution
Questions # 240:

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

Options:

A.

A decrease in control layering effectiveness


B.

An increase in inherent risk


C.

An increase in control vulnerabilities


D.

An increase in the level of residual risk


Expert Solution
Questions # 241:

Which of the following would be MOST beneficial as a key risk indicator (KRI)?

Options:

A.

Current capital allocation reserves


B.

Negative security return on investment (ROI)


C.

Project cost variances


D.

Annualized loss projections


Expert Solution
Questions # 242:

Which of the following is the MOST effective way to evaluate control implementation processes?

Options:

A.

Engage regular external audits.


B.

Determine if residual risk is within risk appetite.


C.

Interview users who detect and report issues


D.

Review trends in the number of exceptions.


Expert Solution
Questions # 243:

What would be a risk practitioner ' s BEST recommendation when several key performance indicators (KPIs) for a control process fail to meet service level agreements (SLAs)?

Options:

A.

Adjust the process KPI threshold.


B.

Develop an IT risk response plan.


C.

Review the organization ' s IT risk profile.


D.

Review process efficiency.


Expert Solution
Questions # 244:

Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?

Options:

A.

Failed login attempts


B.

Simulating a denial of service attack


C.

Absence of IT audit findings


D.

Penetration test


Expert Solution
Questions # 245:
Options:

A.

Conduct frequent internal audits of IT systems.


B.

Review information from threat intelligence sources.


C.

Define a comprehensive set of key risk indicators (KRIs).


D.

Document thorough IT risk scenarios in the risk register.


Expert Solution
Questions # 246:

Which of the following is the BEST indication of an effective risk management program?

Options:

A.

Risk action plans are approved by senior management.


B.

Residual risk is within the organizational risk appetite


C.

Mitigating controls are designed and implemented.


D.

Risk is recorded and tracked in the risk register


Expert Solution
Questions # 247:

An organization ' s financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?

Options:

A.

IT risk manager


B.

IT system owner


C.

Information security manager


D.

Business owner


Expert Solution
Questions # 248:

Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?

Options:

A.

IT management


B.

Internal audit


C.

Process owners


D.

Senior management


Expert Solution
Questions # 249:

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

Options:

A.

The network security policy


B.

Potential business impact


C.

The WiFi access point configuration


D.

Planned remediation actions


Expert Solution
Questions # 250:

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

Options:

A.

A recommendation for internal audit validation


B.

Plans for mitigating the associated risk


C.

Suggestions for improving risk awareness training


D.

The impact to the organization’s risk profile


Expert Solution
Viewing page 5 out of 12 pages
Viewing questions 201-250 out of questions