Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 6 out of 12 pages
Viewing questions 251-300 out of questions
Questions # 251:

Which of the following is the BEST approach for selecting controls to minimize risk?

Options:

A.

Industry best practice review


B.

Risk assessment


C.

Cost-benefit analysis


D.

Control-effectiveness evaluation


Expert Solution
Questions # 252:

Which of the following should be the PRIMARY recipient of reports showing the

progress of a current IT risk mitigation project?

Options:

A.

Senior management


B.

Project manager


C.

Project sponsor


D.

IT risk manager


Expert Solution
Questions # 253:

Which of the following BEST assists in justifying an investment in automated controls?

Options:

A.

Cost-benefit analysis


B.

Alignment of investment with risk appetite


C.

Elimination of compensating controls


D.

Reduction in personnel costs


Expert Solution
Questions # 254:

Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?

Options:

A.

Risk policy review


B.

Business impact analysis (B1A)


C.

Control catalog


D.

Risk register


Expert Solution
Questions # 255:

Which of the following should be an element of the risk appetite of an organization?

Options:

A.

The effectiveness of compensating controls


B.

The enterprise's capacity to absorb loss


C.

The residual risk affected by preventive controls


D.

The amount of inherent risk considered appropriate


Expert Solution
Questions # 256:

Which of the following is MOST important for an organization to consider when developing its IT strategy?

Options:

A.

IT goals and objectives


B.

Organizational goals and objectives


C.

The organization's risk appetite statement


D.

Legal and regulatory requirements


Expert Solution
Questions # 257:

An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?

Options:

A.

Enforce criminal background checks.


B.

Mask customer data fields.


C.

Require vendor to sign a confidentiality agreement.


D.

Restrict access to customer data on a "need to know'' basis.


Expert Solution
Questions # 258:

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

Options:

A.

Conduct risk classification for associated IT controls.


B.

Determine whether risk responses still effectively address risk.


C.

Perform vulnerability and threat assessments.


D.

Analyze and update IT control assessments.


Expert Solution
Questions # 259:

Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?

Options:

A.

The number of security incidents escalated to senior management


B.

The number of resolved security incidents


C.

The number of newly identified security incidents


D.

The number of recurring security incidents


Expert Solution
Questions # 260:

Who should have the authority to approve an exception to a control?

Options:

A.

information security manager


B.

Control owner


C.

Risk owner


D.

Risk manager


Expert Solution
Questions # 261:

Which of the following is the PRIMARY accountability for a control owner?

Options:

A.

Communicate risk to senior management.


B.

Own the associated risk the control is mitigating.


C.

Ensure the control operates effectively.


D.

Identify and assess control weaknesses.


Expert Solution
Questions # 262:

Key risk indicators (KRIs) BEST support risk treatment when they:

Options:

A.

Set performance expectations for controls.


B.

Align with key business objectives.


C.

Indicate that the risk is approaching predefined thresholds.


D.

Articulate likelihood and impact in quantitative terms.


Expert Solution
Questions # 263:

Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?

Options:

A.

A technology review and approval process


B.

An acceptable use policy


C.

An automated network scanning solution


D.

A bring your own device (BYOD) policy


Expert Solution
Questions # 264:

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

Options:

A.

The volume of risk scenarios is too large


B.

Risk aggregation has not been completed


C.

Risk scenarios are not applicable


D.

The risk analysts for each scenario is incomplete


Expert Solution
Questions # 265:

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

Options:

A.

communication


B.

identification.


C.

treatment.


D.

assessment.


Expert Solution
Questions # 266:

Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?

Options:

A.

Risk maturity


B.

Risk policy


C.

Risk appetite


D.

Risk culture


Expert Solution
Questions # 267:

How does the identification of risk scenarios contribute to effective IT risk management?

Options:

A.

By facilitating post-incident investigations


B.

By enabling proactive risk assessment


C.

By identifying cybersecurity incidents


D.

By creating awareness of risk mitigation strategies


Expert Solution
Questions # 268:

Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?

Options:

A.

Informed consent


B.

Cross border controls


C.

Business impact analysis (BIA)


D.

Data breach protection


Expert Solution
Questions # 269:

Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?

Options:

A.

Fiscal management practices


B.

Business maturity


C.

Budget for implementing security


D.

Management culture


Expert Solution
Questions # 270:

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

Options:

A.

IT risk practitioner


B.

Third -partf3ecurity team


C.

The relationship owner


D.

Legal representation of the business


Expert Solution
Questions # 271:

When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:

Options:

A.

Assess generic risk scenarios with business users.


B.

Validate the generic risk scenarios for relevance.


C.

Select the maximum possible risk scenarios from the list.


D.

Identify common threats causing generic risk scenarios


Expert Solution
Questions # 272:

After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?

Options:

A.

The risk practitioner


B.

The business process owner


C.

The risk owner


D.

The control owner


Expert Solution
Questions # 273:

Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?

Options:

A.

Informing business process owners of the risk


B.

Reviewing and updating the risk register


C.

Assigning action items and deadlines to specific individuals


D.

Implementing new control technologies


Expert Solution
Questions # 274:

A risk practitioner has reviewed new international regulations and realizes the new regulations will affect the organization. Which of the following should be the risk practitioner's NEXT course of

action?

Options:

A.

Conduct a peer response assessment.


B.

Update risk scenarios in the risk register.


C.

Reevaluate the risk management program.


D.

Ensure applications are compliant.


Expert Solution
Questions # 275:

Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?

Options:

A.

Percentage of unpatched IT assets


B.

Percentage of IT assets without ownership


C.

The number of IT assets securely disposed during the past year


D.

The number of IT assets procured during the previous month


Expert Solution
Questions # 276:

Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?

Options:

A.

The report was provided directly from the vendor.


B.

The risk associated with multiple control gaps was accepted.


C.

The control owners disagreed with the auditor's recommendations.


D.

The controls had recurring noncompliance.


Expert Solution
Questions # 277:

Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?

Options:

A.

The outsourcing of related IT processes


B.

Outcomes of periodic risk assessments


C.

Changes in service level objectives


D.

Findings from continuous monitoring


Expert Solution
Questions # 278:

An IT risk threat analysis is BEST used to establish

Options:

A.

risk scenarios


B.

risk maps


C.

risk appetite


D.

risk ownership.


Expert Solution
Questions # 279:

A business is conducting a proof of concept on a vendor's Al technology. Which of the following is the MOST important consideration for managing risk?

Options:

A.

Use of a non-production environment


B.

Adequate vendor support


C.

Third-party management plan


D.

Regular security updates


Expert Solution
Questions # 280:

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

Options:

A.

Update firewall configuration


B.

Require strong password complexity


C.

implement a security awareness program


D.

Implement two-factor authentication


Expert Solution
Questions # 281:

After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?

Options:

A.

Escalate the issue to the service provider.


B.

Re-certify the application access controls.


C.

Remove the developer's access.


D.

Review the results of pre-migration testing.


Expert Solution
Questions # 282:

Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?

Options:

A.

Control matrix documentation


B.

Vendor security reports


C.

Service Level Agreement (SLA)


D.

An independent third-party audit


Expert Solution
Questions # 283:

Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?

Options:

A.

Automated access revocation


B.

Daily transaction reconciliation


C.

Rule-based data analytics


D.

Role-based user access model


Expert Solution
Questions # 284:

When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?

Options:

A.

List of recent incidents affecting industry peers


B.

Results of external attacks and related compensating controls


C.

Gaps between current and desired states of the control environment


D.

Review of leading IT risk management practices within the industry


Expert Solution
Questions # 285:

The PRIMARY focus of an ongoing risk awareness program should be to:

Options:

A.

enable better risk-based decisions.


B.

define appropriate controls to mitigate risk.


C.

determine impact of risk scenarios.


D.

expand understanding of risk indicators.


Expert Solution
Questions # 286:

Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?

Options:

A.

Threat landscape


B.

Risk appetite


C.

Risk register


D.

Risk metrics


Expert Solution
Questions # 287:

Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?

Options:

A.

To ensure emerging risk is identified and monitored


B.

To establish the maturity level of risk assessment processes


C.

To promote a risk-aware culture among staff


D.

To ensure risk trend data is collected and reported


Expert Solution
Questions # 288:

Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?

Options:

A.

A high number of approved exceptions exist with compensating controls.


B.

Successive assessments have the same recurring vulnerabilities.


C.

Redundant compensating controls are in place.


D.

Asset custodians are responsible for defining controls instead of asset owners.


Expert Solution
Questions # 289:

Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?

Options:

A.

A companion of risk assessment results to the desired state


B.

A quantitative presentation of risk assessment results


C.

An assessment of organizational maturity levels and readiness


D.

A qualitative presentation of risk assessment results


Expert Solution
Questions # 290:

Which of the following roles would provide the MOST important input when identifying IT risk scenarios?

Options:

A.

Information security managers


B.

Internal auditors


C.

Business process owners


D.

Operational risk managers


Expert Solution
Questions # 291:

Which of the following is the MOST effective key performance indicator (KPI) for change management?

Options:

A.

Percentage of changes with a fallback plan


B.

Number of changes implemented


C.

Percentage of successful changes


D.

Average time required to implement a change


Expert Solution
Questions # 292:

After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to

Options:

A.

recommend a program that minimizes the concerns of that production system.


B.

inform the process owner of the concerns and propose measures to reduce them.


C.

inform the IT manager of the concerns and propose measures to reduce them.


D.

inform the development team of the concerns and together formulate risk reduction measures.


Expert Solution
Questions # 293:

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

Options:

A.

Percentage of IT assets with current malware definitions


B.

Number of false positives defected over a period of time


C.

Number of alerts generated by the anti-virus software


D.

Frequency of anti-vinjs software updates


Expert Solution
Questions # 294:

Which of the following attributes of a key risk indicator (KRI) is MOST important?

Options:

A.

Repeatable


B.

Automated


C.

Quantitative


D.

Qualitative


Expert Solution
Questions # 295:

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

Options:

A.

Review historical application down me and frequency


B.

Assess the potential impact and cost of mitigation


C.

identify other legacy systems within the organization


D.

Explore the feasibility of replacing the legacy system


Expert Solution
Questions # 296:

Who is ULTIMATELY accountable for risk treatment?

Options:

A.

Risk owner


B.

Enterprise risk management (ERM)


C.

Risk practitioner


D.

Control owner


Expert Solution
Questions # 297:

An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?

Options:

A.

Limited organizational knowledge of the underlying technology


B.

Lack of commercial software support


C.

Varying costs related to implementation and maintenance


D.

Slow adoption of the technology across the financial industry


Expert Solution
Questions # 298:

After identifying new risk events during a project, the project manager s NEXT step should be to:

Options:

A.

determine if the scenarios need 10 be accepted or responded to.


B.

record the scenarios into the risk register.


C.

continue with a qualitative risk analysis.


D.

continue with a quantitative risk analysis.


Expert Solution
Questions # 299:

An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?

Options:

A.

Organizational strategy


B.

Employee code of conduct


C.

Industry best practices


D.

Organizational policy


Expert Solution
Questions # 300:

Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?

Options:

A.

Availability of test data


B.

Integrity of data


C.

Cost overruns


D.

System performance


Expert Solution
Viewing page 6 out of 12 pages
Viewing questions 251-300 out of questions