Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 201-250 out of questions
Questions # 201:

Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?

Options:

A.

Assigning identification dates for risk scenarios in the risk register


B.

Updating impact assessments for risk scenario


C.

Verifying whether risk action plans have been completed


D.

Reviewing key risk indicators (KRIS)


Expert Solution
Questions # 202:

Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?

Options:

A.

To provide data for establishing the risk profile


B.

To provide assurance of adherence to risk management policies


C.

To provide measurements on the potential for risk to occur


D.

To provide assessments of mitigation effectiveness


Expert Solution
Questions # 203:

An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?

Options:

A.

Requiring the use of virtual private networks (VPNs)


B.

Establishing a data classification policy


C.

Conducting user awareness training


D.

Requiring employee agreement of the acceptable use policy


Expert Solution
Questions # 204:

Which of the following provides the BEST evidence that risk responses are effective?

Options:

A.

Residual risk is within risk tolerance.


B.

Risk with low impact is accepted.


C.

Risk ownership is identified and assigned.


D.

Compliance breaches are addressed in a timely manner.


Expert Solution
Questions # 205:

An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?

Options:

A.

Inherent risk


B.

Risk appetite


C.

Risk tolerance


D.

Residual risk


Expert Solution
Questions # 206:

A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?

Options:

A.

Request a policy exception from senior management.


B.

Comply with the organizational policy.


C.

Report the noncompliance to the local regulatory agency.


D.

Request an exception from the local regulatory agency.


Expert Solution
Questions # 207:

Which of the following is the PRIMARY benefit of using a risk map with stakeholders?

Options:

A.

Consolidates risk response options by severity


B.

Aligns risk appetite with business objectives


C.

Correlates risk scenarios to risk appetite


D.

Defines an organizational risk taxonomy


Expert Solution
Questions # 208:

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

Options:

A.

Evaluate current risk management alignment with relevant regulations


B.

Determine if business continuity procedures are reviewed and updated on a regular basis


C.

Conduct a benchmarking exercise against industry peers


D.

Review the methodology used to conduct the business impact analysis (BIA)


Expert Solution
Questions # 209:

Effective risk communication BEST benefits an organization by:

Options:

A.

helping personnel make better-informed decisions


B.

assisting the development of a risk register.


C.

improving the effectiveness of IT controls.


D.

increasing participation in the risk assessment process.


Expert Solution
Questions # 210:

Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?

Options:

A.

Enable data wipe capabilities


B.

Penetration testing and session timeouts


C.

Implement remote monitoring


D.

Enforce strong passwords and data encryption


Expert Solution
Questions # 211:

Which of the following is the MOST important reason to communicate control effectiveness to senior management?

Options:

A.

To demonstrate alignment with industry best practices


B.

To assure management that control ownership is assigned


C.

To ensure management understands the current risk status


D.

To align risk management with strategic objectives


Expert Solution
Questions # 212:

In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?

Options:

A.

A standardized risk taxonomy


B.

A list of control deficiencies


C.

An enterprise risk ownership policy


D.

An updated risk tolerance metric


Expert Solution
Questions # 213:

Winch of the following is the BEST evidence of an effective risk treatment plan?

Options:

A.

The inherent risk is below the asset residual risk.


B.

Remediation cost is below the asset business value


C.

The risk tolerance threshold s above the asset residual


D.

Remediation is completed within the asset recovery time objective (RTO)


Expert Solution
Questions # 214:

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

Options:

A.

Replace the action owner with a more experienced individual.


B.

Implement compensating controls until the preferred action can be completed.


C.

Change the risk response strategy of the relevant risk to risk avoidance.


D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.


Expert Solution
Questions # 215:

Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?

Options:

A.

Perform an audit.


B.

Conduct a risk analysis.


C.

Develop risk scenarios.


D.

Perform a cost-benefit analysis.


Expert Solution
Questions # 216:

Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?

Options:

A.

Configuration updates do not follow formal change control.


B.

Operational staff perform control self-assessments.


C.

Controls are selected without a formal cost-benefit


D.

analysis-Management reviews security policies once every two years.


Expert Solution
Questions # 217:

Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?

Options:

A.

The report was provided directly from the vendor.


B.

The risk associated with multiple control gaps was accepted.


C.

The control owners disagreed with the auditor's recommendations.


D.

The controls had recurring noncompliance.


Expert Solution
Questions # 218:
Options:

A.

Business information security officer


B.

Service level manager


C.

Business process manager


D.

Data center operations manager


Expert Solution
Questions # 219:

Which of the following scenarios is MOST important to communicate to senior management?

Options:

A.

Accepted risk scenarios with detailed plans for monitoring


B.

Risk scenarios that have been shared with vendors and third parties


C.

Accepted risk scenarios with impact exceeding the risk tolerance


D.

Risk scenarios that have been identified, assessed, and responded to by the risk owners


Expert Solution
Questions # 220:

Which of the following would MOST likely require a risk practitioner to update the risk register?

Options:

A.

An alert being reported by the security operations center.


B.

Development of a project schedule for implementing a risk response


C.

Completion of a project for implementing a new control


D.

Engagement of a third party to conduct a vulnerability scan


Expert Solution
Questions # 221:

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

Options:

A.

Identifying tweets that may compromise enterprise architecture (EA)


B.

Including diverse Business scenarios in user acceptance testing (UAT)


C.

Performing risk assessments during the business case development stage


D.

Including key stakeholders in review of user requirements


Expert Solution
Questions # 222:

Which of the following is MOST helpful in preventing risk events from materializing?

Options:

A.

Prioritizing and tracking issues


B.

Establishing key risk indicators (KRIs)


C.

Reviewing and analyzing security incidents


D.

Maintaining the risk register


Expert Solution
Questions # 223:

When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:

Options:

A.

Relevant policies.


B.

Threat landscape.


C.

Awareness program.


D.

Risk heat map.


Expert Solution
Questions # 224:

During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?

Options:

A.

Risk management framework adopted by each company


B.

Risk registers of both companies


C.

IT balanced scorecard of each company


D.

Most recent internal audit findings from both companies


Expert Solution
Questions # 225:

Which of the following is the MOST important input when developing risk scenarios?

Options:

A.

Key performance indicators


B.

Business objectives


C.

The organization's risk framework


D.

Risk appetite


Expert Solution
Questions # 226:

Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?

Options:

A.

Role-specific technical training


B.

Change management audit


C.

Change control process


D.

Risk assessment


Expert Solution
Questions # 227:

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?

Options:

A.

Conduct an abbreviated version of the assessment.


B.

Report the business unit manager for a possible ethics violation.


C.

Perform the assessment as it would normally be done.


D.

Recommend an internal auditor perform the review.


Expert Solution
Questions # 228:
Options:

A.

Strategic investment portfolio.


B.

Business impact analysis (BIA) results.


C.

Alignment with risk appetite.


D.

Key risk indicator (KRI) trends.


Expert Solution
Questions # 229:

Upon learning that the number of failed backup attempts continually exceeds

the current risk threshold, the risk practitioner should:

Options:

A.

initiate corrective action to address the known deficiency.


B.

adjust the risk threshold to better reflect actual performance.


C.

inquire about the status of any planned corrective actions.


D.

keep monitoring the situation as there is evidence that this is normal.


Expert Solution
Questions # 230:

Which of the following is the BEST way to support communication of emerging risk?

Options:

A.

Update residual risk levels to reflect the expected risk impact.


B.

Adjust inherent risk levels upward.


C.

Include it on the next enterprise risk committee agenda.


D.

Include it in the risk register for ongoing monitoring.


Expert Solution
Questions # 231:

Which of the following is MOST helpful in reducing the likelihood of inaccurate risk assessment results?

Options:

A.

Involving relevant stakeholders in the risk assessment process


B.

Updating organizational risk tolerance levels


C.

Reviewing the applicable risk assessment methodologies


D.

Having internal audit validate control effectiveness


Expert Solution
Questions # 232:

Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?

Options:

A.

A technology review and approval process


B.

An acceptable use policy


C.

An automated network scanning solution


D.

A bring your own device (BYOD) policy


Expert Solution
Questions # 233:

To enable effective integration of IT risk scenarios and ERM, it is MOST important to have a consistent approach to reporting:

Options:

A.

Risk impact and likelihood


B.

Risk velocity


C.

Key risk indicators (KRIs)


D.

Risk response plans and owners


Expert Solution
Questions # 234:

Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?

Options:

A.

Risk register


B.

Risk appetite


C.

Risk dashboard


D.

Risk action plans


Expert Solution
Questions # 235:

The PRIMARY purpose of vulnerability assessments is to:

Options:

A.

provide clear evidence that the system is sufficiently secure.


B.

determine the impact of potential threats.


C.

test intrusion detection systems (IDS) and response procedures.


D.

detect weaknesses that could lead to system compromise.


Expert Solution
Questions # 236:

Who should have the authority to approve an exception to a control?

Options:

A.

information security manager


B.

Control owner


C.

Risk owner


D.

Risk manager


Expert Solution
Questions # 237:

Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?

Options:

A.

Prioritizing threats and controls


B.

Assessing trends in quantitative risk analysis results


C.

Measuring and reporting qualitative risk trends


D.

Conducting stakeholder surveys


Expert Solution
Questions # 238:

An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?

Options:

A.

Periodically review application on BYOD devices


B.

Include BYOD in organizational awareness programs


C.

Implement BYOD mobile device management (MDM) controls.


D.

Enable a remote wee capability for BYOD devices


Expert Solution
Questions # 239:

Which of the following should be the PRIMARY basis for prioritizing risk responses?

Options:

A.

The impact of the risk


B.

The replacement cost of the business asset


C.

The cost of risk mitigation controls


D.

The classification of the business asset


Expert Solution
Questions # 240:

An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?

Options:

A.

Reduced ability to evaluate key risk indicators (KRIs)


B.

Reduced access to internal audit reports


C.

Dependency on the vendor's key performance indicators (KPIs)


D.

Dependency on service level agreements (SLAs)


Expert Solution
Questions # 241:

An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?

Options:

A.

More time has been allotted for testing.


B.

The project is likely to deliver the product late.


C.

A new project manager is handling the project.


D.

The cost of the project will exceed the allotted budget.


Expert Solution
Questions # 242:

Which of the following should be management's PRIMARY consideration when approving risk response action plans?

Options:

A.

Ability of the action plans to address multiple risk scenarios


B.

Ease of implementing the risk treatment solution


C.

Changes in residual risk after implementing the plans


D.

Prioritization for implementing the action plans


Expert Solution
Questions # 243:

Which of the following is MOST important when developing key performance indicators (KPIs)?

Options:

A.

Alignment to risk responses


B.

Alignment to management reports


C.

Alerts when risk thresholds are reached


D.

Identification of trends


Expert Solution
Questions # 244:

Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?

Options:

A.

Data storage and collection methods


B.

Data owner preferences


C.

Legal and regulatory requirements


D.

Choice of encryption algorithms


Expert Solution
Questions # 245:

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

Options:

A.

Conduct social engineering testing.


B.

Audit security awareness training materials.


C.

Administer an end-of-training quiz.


D.

Perform a vulnerability assessment.


Expert Solution
Questions # 246:

When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?

Options:

A.

a identity conditions that may cause disruptions


B.

Review incident response procedures


C.

Evaluate the probability of risk events


D.

Define metrics for restoring availability


Expert Solution
Questions # 247:

Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?

Options:

A.

The business case for the use of loT


B.

The loT threat landscape


C.

Policy development for loT


D.

The network that loT devices can access


Expert Solution
Questions # 248:

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

Options:

A.

Average time to implement patches after vendor release


B.

Number of patches tested prior to deployment


C.

Increase in the frequency of patches deployed into production


D.

Percent of patches implemented within established timeframe


Expert Solution
Questions # 249:

Which of the following should be the PRIMARY area of focus when reporting changes to an organization's risk profile to executive management?

Options:

A.

Risk management resources


B.

Risk tolerance


C.

Cyberattack threats


D.

Risk trends


Expert Solution
Questions # 250:

Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?

Options:

A.

Perform an m-depth code review with an expert


B.

Validate functionality by running in a test environment


C.

Implement a service level agreement.


D.

Utilize the change management process.


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 201-250 out of questions