Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 251-300 out of questions
Questions # 251:

Avoiding a business activity removes the need to determine:

Options:

A.

systemic risk


B.

residual risk


C.

inherent risk


D.

control risk


Expert Solution
Questions # 252:

Who should have the authority to approve an exception to a control?

Options:

A.

information security manager


B.

Control owner


C.

Risk owner


D.

Risk manager


Expert Solution
Questions # 253:

Who should be accountable for authorizing information system access to internal users?

Options:

A.

Information security officer


B.

Information security manager


C.

Information custodian


D.

Information owner


Expert Solution
Questions # 254:

Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?

Options:

A.

Enable data wipe capabilities


B.

Penetration testing and session timeouts


C.

Implement remote monitoring


D.

Enforce strong passwords and data encryption


Expert Solution
Questions # 255:

An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?

Options:

A.

Maximum time gap between patch availability and deployment


B.

Percentage of critical patches deployed within three weeks


C.

Minimum time gap between patch availability and deployment


D.

Number of critical patches deployed within three weeks


Expert Solution
Questions # 256:

Which of the following deficiencies identified during a review of an organization ' s cybersecurity policy should be of MOST concern?

Options:

A.

The policy lacks specifics on how to secure the organization ' s systems from cyberattacks.


B.

The policy has gaps against relevant cybersecurity standards and frameworks.


C.

The policy has not been reviewed by the cybersecurity team in over a year.


D.

The policy has not been approved by the organization ' s board.


Expert Solution
Questions # 257:

During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?

Options:

A.

Monitoring


B.

Development


C.

Implementation


D.

Initiation


Expert Solution
Questions # 258:

Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?

Options:

A.

Completeness of system documentation


B.

Results of end user acceptance testing


C.

Variances between planned and actual cost


D.

availability of in-house resources


Expert Solution
Questions # 259:

Which of the following is the MOST critical factor to consider when determining an organization ' s risk appetite?

Options:

A.

Fiscal management practices


B.

Business maturity


C.

Budget for implementing security


D.

Management culture


Expert Solution
Questions # 260:

Which of the following roles would provide the MOST important input when identifying IT risk scenarios?

Options:

A.

Information security managers


B.

Internal auditors


C.

Business process owners


D.

Operational risk managers


Expert Solution
Questions # 261:

Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?

Options:

A.

Relying on multiple solutions for Zero Trust


B.

Utilizing rapid development during implementation


C.

Establishing a robust technical architecture


D.

Starting with a large initial scope


Expert Solution
Questions # 262:

An organization ' s risk tolerance should be defined and approved by which of the following?

Options:

A.

The chief risk officer (CRO)


B.

The board of directors


C.

The chief executive officer (CEO)


D.

The chief information officer (CIO)


Expert Solution
Questions # 263:

Which of the following is the PRIMARY role of the first line of defense with respect to information security policies?

Options:

A.

Draft the information security policy.


B.

Approve the information security policy.


C.

Audit the implementation of the information security policy.


D.

Implement controls in response to the policy requirements.


Expert Solution
Questions # 264:

The PRIMARY objective of a risk identification process is to:

Options:

A.

evaluate how risk conditions are managed.


B.

determine threats and vulnerabilities.


C.

estimate anticipated financial impact of risk conditions.


D.

establish risk response options.


Expert Solution
Questions # 265:

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

Options:

A.

Relevance to the business process


B.

Regulatory compliance requirements


C.

Cost-benefit analysis


D.

Comparison against best practice


Expert Solution
Questions # 266:

Which of the following is the BEST indication of an enhanced risk-aware culture?

Options:

A.

Users have read and agreed to comply with security policies.


B.

Risk issues are openly discussed within the organization.


C.

Scores have improved on risk awareness quizzes.


D.

There is a decrease in the number of reported incidents.


Expert Solution
Questions # 267:

An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:

Options:

A.

Avoidance


B.

Mitigation


C.

Transfer


D.

Acceptance


Expert Solution
Questions # 268:

An organization control environment is MOST effective when:

Options:

A.

control designs are reviewed periodically


B.

controls perform as intended.


C.

controls are implemented consistently.


D.

controls operate efficiently


Expert Solution
Questions # 269:

An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner ' s BEST course of action?

Options:

A.

Perform an impact assessment.


B.

Perform a penetration test.


C.

Request an external audit.


D.

Escalate the risk to senior management.


Expert Solution
Questions # 270:

Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?

Options:

A.

Data encryption has not been applied to all sensitive data across the organization.


B.

There are many data assets across the organization that need to be classified.


C.

Changes to information handling procedures are not documented.


D.

Changes to data sensitivity during the data life cycle have not been considered.


Expert Solution
Questions # 271:

Which of the following would qualify as a key performance indicator (KPI)?

Options:

A.

Aggregate risk of the organization


B.

Number of identified system vulnerabilities


C.

Number of exception requests processed in the past 90 days


D.

Number of attacks against the organization ' s website


Expert Solution
Questions # 272:

Which of the following is the GREATEST impact of implementing a risk mitigation strategy?

Options:

A.

Improved alignment with business goals.


B.

Reduction of residual risk.


C.

Increased costs due to control implementation.


D.

Decreased overall risk appetite.


Expert Solution
Questions # 273:

Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?

Options:

A.

Conducting security awareness training


B.

Updating the information security policy


C.

Implementing mock phishing exercises


D.

Requiring two-factor authentication


Expert Solution
Questions # 274:

Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?

Options:

A.

Data owner


B.

Control owner


C.

Risk owner


D.

System owner


Expert Solution
Questions # 275:

An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?

Options:

A.

More time has been allotted for testing.


B.

The project is likely to deliver the product late.


C.

A new project manager is handling the project.


D.

The cost of the project will exceed the allotted budget.


Expert Solution
Questions # 276:

A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?

Options:

A.

Increase in compliance breaches


B.

Increase in loss event impact


C.

Increase in residual risk


D.

Increase in customer complaints


Expert Solution
Questions # 277:

An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?

Options:

A.

Data may be commingled with other tenants ' data.


B.

System downtime does not meet the organization ' s thresholds.


C.

The infrastructure will be managed by the public cloud administrator.


D.

The cloud provider is not independently certified.


Expert Solution
Questions # 278:

Mitigating technology risk to acceptable levels should be based PRIMARILY upon:

Options:

A.

organizational risk appetite.


B.

business sector best practices.


C.

business process requirements.


D.

availability of automated solutions


Expert Solution
Questions # 279:

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?

Options:

A.

Develop new loT risk scenarios.


B.

Implement loT device monitoring software.


C.

Introduce controls to the new threat environment.


D.

Engage external security reviews.


Expert Solution
Questions # 280:

Which of the following is the MAIN reason to continuously monitor IT-related risk?

Options:

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors


B.

To update the risk register to reflect changes in levels of identified and new IT-related risk


C.

To ensure risk levels are within acceptable limits of the organization ' s risk appetite and risk tolerance


D.

To help identify root causes of incidents and recommend suitable long-term solutions


Expert Solution
Questions # 281:

A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

IT infrastructure manager


B.

Chief Risk Officer (CRO)


C.

Business continuity manager


D.

Business application owner


Expert Solution
Questions # 282:

Which of the following is the BEST indicator of the effectiveness of a control action plan ' s implementation?

Options:

A.

Increased number of controls


B.

Reduced risk level


C.

Increased risk appetite


D.

Stakeholder commitment


Expert Solution
Questions # 283:

Which of the following is the BEST time for an enterprise project management team to use risk analysis?

Options:

A.

When the final testing phase begins


B.

During the project initiation phase


C.

At the end of the project


D.

During business impact analysis (BIA)


Expert Solution
Questions # 284:

Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?

Options:

A.

Improving risk awareness


B.

Obtaining buy-in from risk owners


C.

Leveraging existing metrics


D.

Optimizing risk treatment decisions


Expert Solution
Questions # 285:

A risk practitioner is evaluating policies defined by an organization as part of its IT security framework. Which of the following would be of GREATEST concern?

Options:

A.

Lack of alignment with global security standards


B.

Inadequate policy enforcement


C.

Lack of a single repository for security procedures


D.

Increased cost for policy adoption


Expert Solution
Questions # 286:

Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?

Options:

A.

Interview control owners.


B.

Observe the control enhancements in operation.


C.

Inspect external audit documentation.


D.

Review management ' s detailed action plans.


Expert Solution
Questions # 287:

Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?

Options:

A.

Identify any new business objectives with stakeholders.


B.

Present a business case for new controls to stakeholders.


C.

Revise the organization ' s risk and control policy.


D.

Review existing risk scenarios with stakeholders.


Expert Solution
Questions # 288:

Which of the following will provide the BEST measure of compliance with IT policies?

Options:

A.

Evaluate past policy review reports.


B.

Conduct regular independent reviews.


C.

Perform penetration testing.


D.

Test staff on their compliance responsibilities.


Expert Solution
Questions # 289:

An automobile manufacturer is considering implementing an Internet of Things (IoT) network to improve customer service by collecting customer and vehicle data. Which of the following would be the risk practitioner’s BEST recommendation?

Options:

A.

Establish secure design and coding practices for the IoT network and devices


B.

Conduct a pilot program before implementing the IoT network and devices


C.

Ensure backward compatibility of IoT devices with previous generations of vehicles


D.

Provide a range of IoT device options and configurations for customers


Expert Solution
Questions # 290:

After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?

Options:

A.

Implement new controls.


B.

Update the risk profile.


C.

Re-evaluate the risk tolerance.


D.

Inform executive leadership.


Expert Solution
Questions # 291:

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

Options:

A.

The percentage of servers with allowed patching exceptions


B.

The number of servers with local credentials to install patches


C.

The percentage of servers patched within required service level agreements


D.

The number of servers running the software patching service


Expert Solution
Questions # 292:

Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application?

Options:

A.

The third-party risk manager


B.

The application vendor


C.

The business process owner


D.

The information security manager


Expert Solution
Questions # 293:

What is the MOST effective approach to promote ethical decision-making in a global organization?

Options:

A.

Embed risk averse culture within the organization.


B.

Ensure ethics considerations are made in the hiring process.


C.

Ensure code of conduct is incorporated into organization-wide awareness training


D.

Require annual metrics related to ethics be reported.


Expert Solution
Questions # 294:

Which of the following would BEST indicate to senior management that IT processes are improving?

Options:

A.

Changes in the number of intrusions detected


B.

Changes in the number of security exceptions


C.

Changes in the position in the maturity model


D.

Changes to the structure of the risk register


Expert Solution
Questions # 295:

Which of the following provides the MOST comprehensive information when developing a risk profile for a system?

Options:

A.

Results of a business impact analysis (BIA)


B.

Risk assessment results


C.

A mapping of resources to business processes


D.

Key performance indicators (KPIs)


Expert Solution
Questions # 296:

Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor ' s control environment?

Options:

A.

The report was provided directly from the vendor.


B.

The risk associated with multiple control gaps was accepted.


C.

The control owners disagreed with the auditor ' s recommendations.


D.

The controls had recurring noncompliance.


Expert Solution
Questions # 297:

Which of the following provides the BEST assurance of…..

Options:

A.

Penetration testing


B.

Service-level monitoring


C.

Service provider ' s control self-assessment (CSA)


D.

Independent assessment report


Expert Solution
Questions # 298:

Which of the following BEST indicates that additional or improved controls ate needed m the environment?

Options:

A.

Management, has decreased organisational risk appetite


B.

The risk register and portfolio do not include all risk scenarios


C.

merging risk scenarios have been identified


D.

Risk events and losses exceed risk tolerance


Expert Solution
Questions # 299:

A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?

Options:

A.

Impact of the change on inherent risk


B.

Approval for the change by the risk owner


C.

Business rationale for the change


D.

Risk to the mitigation effort due to the change


Expert Solution
Questions # 300:

Which of the following is a risk practitioner ' s BEST recommendation to senior management when the cost to mitigate a risk scenario exceeds the financial impact should the risk materialize?

Options:

A.

Manage the risk within risk tolerance.


B.

Implement the risk mitigation plan.


C.

Reassess the risk frequently


D.

Increase the organization ' s risk appetite.


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 251-300 out of questions