Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 251-300 out of questions
Questions # 251:

Within the three lines of defense model, the responsibility for managing risk and controls resides with:

Options:

A.

operational management.


B.

the risk practitioner.


C.

the internal auditor.


D.

executive management.


Expert Solution
Questions # 252:

A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider who should the risk scenario be reassigned to.

Options:

A.

Senior management


B.

Chief risk officer (CRO)


C.

Vendor manager


D.

Data owner


Expert Solution
Questions # 253:

The PRIMARY benefit associated with key risk indicators (KRls) is that they:

Options:

A.

help an organization identify emerging threats.


B.

benchmark the organization's risk profile.


C.

identify trends in the organization's vulnerabilities.


D.

enable ongoing monitoring of emerging risk.


Expert Solution
Questions # 254:

Which of the following BEST enables effective IT control implementation?

Options:

A.

Key risk indicators (KRIs)


B.

Documented procedures


C.

Information security policies


D.

Information security standards


Expert Solution
Questions # 255:

Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?

Options:

A.

To reduce the likelihood of insider threat


B.

To eliminate the possibility of insider threat


C.

To enable rapid discovery of insider threat


D.

To reduce the impact of insider threat


Expert Solution
Questions # 256:

An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?

Options:

A.

Implement continuous control monitoring.


B.

Communicate the risk to management.


C.

Introduce recovery control procedures.


D.

Document a risk response plan.


Expert Solution
Questions # 257:

An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?

Options:

A.

Security control owners based on control failures


B.

Cyber risk remediation plan owners


C.

Risk owners based on risk impact


D.

Enterprise risk management (ERM) team


Expert Solution
Questions # 258:

An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?

Options:

A.

Assess the impact of applying the patches on the production environment.


B.

Survey other enterprises regarding their experiences with applying these patches.


C.

Seek information from the software vendor to enable effective application of the patches.


D.

Determine in advance an off-peak period to apply the patches.


Expert Solution
Questions # 259:

The MOST essential content to include in an IT risk awareness program is how to:

Options:

A.

populate risk register entries and build a risk profile for management reporting.


B.

prioritize IT-related actions by considering risk appetite and risk tolerance.


C.

define the IT risk framework for the organization.


D.

comply with the organization's IT risk and information security policies.


Expert Solution
Questions # 260:
Options:

A.

Conduct frequent internal audits of IT systems.


B.

Review information from threat intelligence sources.


C.

Define a comprehensive set of key risk indicators (KRIs).


D.

Document thorough IT risk scenarios in the risk register.


Expert Solution
Questions # 261:

Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?

Options:

A.

Proportion of end users having more than one account


B.

Percentage of accounts disabled within the service level agreement (SLA)


C.

Proportion of privileged to non-privileged accounts


D.

Percentage of accounts that have not been activated


Expert Solution
Questions # 262:

Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?

Options:

A.

Perform a return on investment analysis.


B.

Review the risk register and risk scenarios.


C.

Calculate annualized loss expectancy of risk scenarios.


D.

Raise the maturity of organizational risk management.


Expert Solution
Questions # 263:

An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?

Options:

A.

Risk likelihood


B.

Risk culture


C.

Risk appetite


D.

Risk capacity


Expert Solution
Questions # 264:

Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?

Options:

A.

Perform a business case analysis


B.

Implement compensating controls.


C.

Conduct a control sell-assessment (CSA)


D.

Build a provision for risk


Expert Solution
Questions # 265:

An organization mandates the escalation of a service ticket when a key application is offline for 5 minutes or more due to potential risk exposure. The risk practitioner has been asked by management to prepare a report of application offline times using both 3- and 5-minute thresholds. What does the 3-minute threshold represent?

Options:

A.

Recovery Time Objective (RTO)


B.

Key Risk Indicator (KRI)


C.

Recovery Point Objective (RPO)


D.

Key Performance Indicator (KPI)


Expert Solution
Questions # 266:

What is the BEST information to present to business control owners when justifying costs related to controls?

Options:

A.

Loss event frequency and magnitude


B.

The previous year's budget and actuals


C.

Industry benchmarks and standards


D.

Return on IT security-related investments


Expert Solution
Questions # 267:

Which of the following would be MOST helpful when estimating the likelihood of negative events?

Options:

A.

Business impact analysis


B.

Threat analysis


C.

Risk response analysis


D.

Cost-benefit analysis


Expert Solution
Questions # 268:

An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?

Options:

A.

Insufficient network isolation


B.

impact on network performance


C.

insecure data transmission protocols


D.

Lack of interoperability between sensors


Expert Solution
Questions # 269:

An organization has established workflows in its service desk to support employee reports of security-related concerns. Which of the following is the MOST efficient approach to analyze these concerns?

Options:

A.

Map concerns to organizational assets.


B.

Sort concerns by likelihood.


C.

Align concerns to key vendors.


D.

Prioritize concerns based on frequency of reports.


Expert Solution
Questions # 270:

A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

Business application owner


B.

Business continuity manager


C.

Chief risk officer (CRO)


D.

IT infrastructure manager


Expert Solution
Questions # 271:

What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?

Options:

A.

Aggregated risk may exceed the enterprise's risk appetite and tolerance.


B.

Duplicate resources may be used to manage risk registers.


C.

Standardization of risk management practices may be difficult to enforce.


D.

Risk analysis may be inconsistent due to non-uniform impact and likelihood scales.


Expert Solution
Questions # 272:

Which of the following is a drawback in the use of quantitative risk analysis?

Options:

A.

It assigns numeric values to exposures of assets.


B.

It requires more resources than other methods


C.

It produces the results in numeric form.


D.

It is based on impact analysis of information assets.


Expert Solution
Questions # 273:

When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?

Options:

A.

Before defining a framework


B.

During the risk assessment


C.

When evaluating risk response


D.

When updating the risk register


Expert Solution
Questions # 274:

Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?

Options:

A.

Risk mitigation budget


B.

Business Impact analysis


C.

Cost-benefit analysis


D.

Return on investment


Expert Solution
Questions # 275:

An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?

Options:

A.

Identify systems that are vulnerable to being exploited by the attack.


B.

Confirm with the antivirus solution vendor whether the next update will detect the attack.


C.

Verify the data backup process and confirm which backups are the most recent ones available.


D.

Obtain approval for funding to purchase a cyber insurance plan.


Expert Solution
Questions # 276:

An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?

Options:

A.

The controls may not be properly tested


B.

The vendor will not ensure against control failure


C.

The vendor will not achieve best practices


D.

Lack of a risk-based approach to access control


Expert Solution
Questions # 277:

A migration from an in-house developed system to an external cloud-based solution is affecting a previously rated key risk scenario related to payroll processing. Which part of the risk register should be updated FIRST?

Options:

A.

Payroll system risk factors


B.

Payroll system risk mitigation plans


C.

Payroll process owner


D.

Payroll administrative controls


Expert Solution
Questions # 278:

Which of the following is the PRIMARY risk management responsibility of the third line of defense?

Options:

A.

Providing assurance of the effectiveness of risk management activities


B.

Providing guidance on the design of effective controls


C.

Providing advisory services on enterprise risk management (ERM)


D.

Providing benchmarking on other organizations' risk management programs


Expert Solution
Questions # 279:

An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?

Options:

A.

Top-down analysis


B.

Event tree analysis


C.

Control gap analysis


D.

Bottom-up analysis


Expert Solution
Questions # 280:

Which of the following will BEST support management repotting on risk?

Options:

A.

Risk policy requirements


B.

A risk register


C.

Control self-assessment


D.

Key performance Indicators


Expert Solution
Questions # 281:

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

Options:

A.

Project sponsor


B.

Process owner


C.

Risk manager


D.

Internal auditor


Expert Solution
Questions # 282:

When creating a program to manage data privacy risk, which of the following is MOST important to ensure that the program is successful?

Options:

A.

Compliance with industry frameworks


B.

Alignment with applicable legal and regulatory requirements


C.

Approval of mitigating and compensating controls


D.

Adoption of mission and vision statements


Expert Solution
Questions # 283:

A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?

Options:

A.

The user requirements were not documented.


B.

Payroll files were not under the control of a librarian.


C.

The programmer had access to the production programs.


D.

The programmer did not involve the user in testing.


Expert Solution
Questions # 284:

Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?

Options:

A.

Tokenized personal data only in test environments


B.

Data loss prevention tools (DLP) installed in passive mode


C.

Anonymized personal data in non-production environments


D.

Multi-factor authentication for access to non-production environments


Expert Solution
Questions # 285:

During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?

Options:

A.

Insufficient laptops for existing employees


B.

Abuse of leavers' account privileges


C.

Unauthorized access to organizational data


D.

Financial cost of replacing the laptops


Expert Solution
Questions # 286:

Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?

Options:

A.

The type of shared data


B.

The level of residual risk after data loss prevention (DLP) controls are implemented


C.

The monetary value of the unique records that could be re-identified


D.

The impact to affected stakeholders


Expert Solution
Questions # 287:

What should be the PRIMARY objective of updating a risk awareness program in response to a steady rise in cybersecurity threats across the industry?

Options:

A.

To increase familiarity and understanding of potential security incidents


B.

To ensure compliance with risk management policies and procedures


C.

To reduce the risk of insider threats that could compromise security practices


D.

To lower the organization's risk appetite and tolerance levels


Expert Solution
Questions # 288:

Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:

Options:

A.

communicate risk trends to stakeholders.


B.

assign ownership of emerging risk scenarios.


C.

highlight noncompliance with the risk policy


D.

identify threats to emerging technologies.


Expert Solution
Questions # 289:

Which of the following is the GREATEST risk associated with inappropriate classification of data?

Options:

A.

Inaccurate record management data


B.

Inaccurate recovery time objectives (RTOs)


C.

Lack of accountability for data ownership


D.

Users having unauthorized access to data


Expert Solution
Questions # 290:

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

Options:

A.

Educating employees on what needs to be kept confidential


B.

Implementing a data loss prevention (DLP) solution


C.

Taking punitive action against employees who expose confidential data


D.

Requiring employees to sign nondisclosure agreements


Expert Solution
Questions # 291:

Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?

Options:

A.

Recovery time objective (RTO)


B.

Cost-benefit analysis


C.

Business impact analysis (BIA)


D.

Cyber insurance coverage


Expert Solution
Questions # 292:

Which of the following would BEST facilitate the implementation of data classification requirements?

Options:

A.

Assigning a data owner


B.

Implementing technical control over the assets


C.

Implementing a data loss prevention (DLP) solution


D.

Scheduling periodic audits


Expert Solution
Questions # 293:

Who is MOST important lo include in the assessment of existing IT risk scenarios?

Options:

A.

Technology subject matter experts


B.

Business process owners


C.

Business users of IT systems


D.

Risk management consultants


Expert Solution
Questions # 294:

Risk acceptance of an exception to a security control would MOST likely be justified when:

Options:

A.

automation cannot be applied to the control


B.

business benefits exceed the loss exposure.


C.

the end-user license agreement has expired.


D.

the control is difficult to enforce in practice.


Expert Solution
Questions # 295:

When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:

Options:

A.

Assess generic risk scenarios with business users.


B.

Validate the generic risk scenarios for relevance.


C.

Select the maximum possible risk scenarios from the list.


D.

Identify common threats causing generic risk scenarios


Expert Solution
Questions # 296:

When of the following provides the MOST tenable evidence that a business process control is effective?

Options:

A.

Demonstration that the control is operating as designed


B.

A successful walk-through of the associated risk assessment


C.

Management attestation that the control is operating effectively


D.

Automated data indicating that risk has been reduced


Expert Solution
Questions # 297:

Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?

Options:

A.

Management approval


B.

Annual review


C.

Relevance


D.

Automation


Expert Solution
Questions # 298:

Which of the following is the MOST reliable validation of a new control?

Options:

A.

Approval of the control by senior management


B.

Complete and accurate documentation of control objectives


C.

Control owner attestation of control effectiveness


D.

Internal audit review of control design


Expert Solution
Questions # 299:

Which of the following BEST enables detection of ethical violations committed by employees?

Options:

A.

Transaction log monitoring


B.

Access control attestation


C.

Periodic job rotation


D.

Whistleblower program


Expert Solution
Questions # 300:

Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?

Options:

A.

Conduct penetration testing.


B.

Interview IT operations personnel.


C.

Conduct vulnerability scans.


D.

Review change control board documentation.


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 251-300 out of questions