Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 301-350 out of questions
Questions # 301:

Which of these documents is MOST important to request from a cloud service

provider during a vendor risk assessment?

Options:

A.

Nondisclosure agreement (NDA)


B.

Independent audit report


C.

Business impact analysis (BIA)


D.

Service level agreement (SLA)


Expert Solution
Questions # 302:

Who is accountable for the process when an IT stakeholder operates a key control to address a risk scenario?

Options:

A.

Data custodian


B.

Risk owner


C.

System owner


D.

IT manager


Expert Solution
Questions # 303:

Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?

Options:

A.

System owner


B.

Internal auditor


C.

Process owner


D.

Risk owner


Expert Solution
Questions # 304:

Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:

Options:

A.

line management.


B.

the IT risk function.


C.

enterprise compliance.


D.

internal audit.


Expert Solution
Questions # 305:

Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?

Options:

A.

To monitor changes in the risk environment


B.

To provide input to management for the adjustment of risk appetite


C.

To monitor the accuracy of threshold levels in metrics


D.

To obtain business buy-in for investment in risk mitigation measures


Expert Solution
Questions # 306:

Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?

Options:

A.

Communicate potential impact to decision makers.


B.

Research the root cause of similar incidents.


C.

Verify the response plan is adequate.


D.

Increase human resources to respond in the interim.


Expert Solution
Questions # 307:

Which of the following is the MOST important responsibility of a risk owner?

Options:

A.

Testing control design


B.

Accepting residual risk


C.

Establishing business information criteria


D.

Establishing the risk register


Expert Solution
Questions # 308:

A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:

Options:

A.

strategy.


B.

profile.


C.

process.


D.

map.


Expert Solution
Questions # 309:

Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?

Options:

A.

Recommend the IT department remove access to the cloud services.


B.

Engage with the business area managers to review controls applied.


C.

Escalate to the risk committee.


D.

Recommend a risk assessment be conducted.


Expert Solution
Questions # 310:

Performing a background check on a new employee candidate before hiring is an example of what type of control?

Options:

A.

Detective


B.

Compensating


C.

Corrective


D.

Preventive


Expert Solution
Questions # 311:

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?

Options:

A.

Impact of risk occurrence


B.

Frequency of risk occurrence


C.

Cost of risk response


D.

Legal aspects of risk realization


Expert Solution
Questions # 312:

Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?

Options:

A.

Implement additional controls to further mitigate risk


B.

Review performance results with the control owner


C.

Redefine performance criteria based on control monitoring results


D.

Recommend a tool to meet the performance requirements


Expert Solution
Questions # 313:

A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?

Options:

A.

The organization has incorporated blockchain technology in its operations.


B.

The organization has not reviewed its encryption standards.


C.

The organization has implemented heuristics on its network firewall.


D.

The organization has not adopted Infrastructure as a Service (laaS) for its operations.


Expert Solution
Questions # 314:

Which of the following problems is BEST solved by a cloud access security broker (CASB)?

Options:

A.

Lack of expertise to implement single sign-on (SSO)


B.

Cloud access security vendor selection


C.

Inadequate key management policies


D.

Inconsistently applied security policies


Expert Solution
Questions # 315:

A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:

Options:

A.

based on industry trends.


B.

mapped to incident response plans.


C.

related to probable events.


D.

aligned with risk management capabilities.


Expert Solution
Questions # 316:

A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?

Options:

A.

Single sign-on


B.

Audit trail review


C.

Multi-factor authentication


D.

Data encryption at rest


Expert Solution
Questions # 317:

An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?

Options:

A.

Implementing an emergency change authorization process


B.

Periodically reviewing operator logs


C.

Limiting the number of super users


D.

Reviewing the programmers' emergency change reports


Expert Solution
Questions # 318:

Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?

Options:

A.

Conducting training on the protection of organizational assets


B.

Configuring devices to use virtual IP addresses


C.

Ensuring patching for end-user devices


D.

Providing encrypted access to organizational assets


Expert Solution
Questions # 319:

The PRIMARY benefit of classifying information assets is that it helps to:

Options:

A.

communicate risk to senior management


B.

assign risk ownership


C.

facilitate internal audit


D.

determine the appropriate level of control


Expert Solution
Questions # 320:

Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?

Options:

A.

Percentage of systems included in recovery processes


B.

Number of key systems hosted


C.

Average response time to resolve system incidents


D.

Percentage of system availability


Expert Solution
Questions # 321:

A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?

Options:

A.

Peak demand on the cloud service during business hours


B.

Percentage of technology upgrades resulting in security breaches


C.

Number of incidents with downtime exceeding contract threshold


D.

Percentage of servers not patched per policy


Expert Solution
Questions # 322:

Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?

Options:

A.

Time required for backup restoration testing


B.

Change in size of data backed up


C.

Successful completion of backup operations


D.

Percentage of failed restore tests


Expert Solution
Questions # 323:

Who should be PRIMARILY responsible for establishing an organization's IT risk culture?

Options:

A.

Business process owner


B.

Executive management


C.

Risk management


D.

IT management


Expert Solution
Questions # 324:

Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?

Options:

A.

It provides a cost-benefit analysis on control options available for implementation.


B.

It provides a view on where controls should be applied to maximize the uptime of servers.


C.

It provides historical information about the impact of individual servers malfunctioning.


D.

It provides a comprehensive view of the impact should the servers simultaneously fail.


Expert Solution
Questions # 325:

Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?

Options:

A.

Likelihood of a threat


B.

Impact of technology risk


C.

Impact of operational risk


D.

Control weakness


Expert Solution
Questions # 326:

An updated report from a trusted research organization shows that attacks have increased in the organization's industry segment. What should be done FIRST to integrate this data into risk assessments?

Options:

A.

Average the ransomware attack frequencies together


B.

Revise the threat frequency for ransomware attack types


C.

Adjust impact amounts based on the average ransom


D.

Use the new frequency as the maximum value in a Monte Carlo simulation


Expert Solution
Questions # 327:

Which of the following BEST indicates whether security awareness training is effective?

Options:

A.

User self-assessment


B.

User behavior after training


C.

Course evaluation


D.

Quality of training materials


Expert Solution
Questions # 328:

An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?

Options:

A.

Key control owner


B.

Operational risk manager


C.

Business process owner


D.

Chief information security officer (CISO)


Expert Solution
Questions # 329:

Which of the following should be the FIRST consideration when establishing a new risk governance program?

Options:

A.

Developing an ongoing awareness and training program


B.

Creating policies and standards that are easy to comprehend


C.

Embedding risk management into the organization


D.

Completing annual risk assessments on critical resources


Expert Solution
Questions # 330:

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

Options:

A.

Evaluate current risk management alignment with relevant regulations.


B.

Determine if business continuity procedures are reviewed and updated on a regular basis.


C.

Review the methodology used to conduct the business impact analysis (BIA).


D.

Conduct a benchmarking exercise against industry peers.


Expert Solution
Questions # 331:

The PRIMARY benefit associated with key risk indicators (KRls) is that they:

Options:

A.

help an organization identify emerging threats.


B.

benchmark the organization's risk profile.


C.

identify trends in the organization's vulnerabilities.


D.

enable ongoing monitoring of emerging risk.


Expert Solution
Questions # 332:

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''

Options:

A.

To ensure completion of the risk assessment cycle


B.

To ensure controls arc operating effectively


C.

To ensure residual risk Is at an acceptable level


D.

To ensure control costs do not exceed benefits


Expert Solution
Questions # 333:

Which of the following BEST enables detection of ethical violations committed by employees?

Options:

A.

Transaction log monitoring


B.

Access control attestation


C.

Periodic job rotation


D.

Whistleblower program


Expert Solution
Questions # 334:

An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?

Options:

A.

Data minimization


B.

Accountability


C.

Accuracy


D.

Purpose limitation


Expert Solution
Questions # 335:

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

Options:

A.

The risk practitioner


B.

The risk owner


C.

The control owner


D.

The audit manager


Expert Solution
Questions # 336:

An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:

Options:

A.

transferred


B.

mitigated.


C.

accepted


D.

avoided


Expert Solution
Questions # 337:

As part of an overall IT risk management plan, an IT risk register BEST helps management:

Options:

A.

align IT processes with business objectives.


B.

communicate the enterprise risk management policy.


C.

stay current with existing control status.


D.

understand the organizational risk profile.


Expert Solution
Questions # 338:

Which of the following is the BEST evidence that risk management is driving business decisions in an organization?

Options:

A.

Compliance breaches are addressed in a timely manner.


B.

Risk ownership is identified and assigned.


C.

Risk treatment options receive adequate funding.


D.

Residual risk is within risk tolerance.


Expert Solution
Questions # 339:

One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?

Options:

A.

Additional mitigating controls should be identified.


B.

The system should not be used until the application is changed


C.

The organization's IT risk appetite should be adjusted.


D.

The associated IT risk should be accepted by management.


Expert Solution
Questions # 340:

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?

Options:

A.

Conduct an abbreviated version of the assessment.


B.

Report the business unit manager for a possible ethics violation.


C.

Perform the assessment as it would normally be done.


D.

Recommend an internal auditor perform the review.


Expert Solution
Questions # 341:

Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?

Options:

A.

Risk tolerance


B.

Risk appetite


C.

Risk sensitivity


D.

Risk velocity


Expert Solution
Questions # 342:

If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7

Options:

A.

Evaluate alternative controls.


B.

Redefine the business process to reduce the risk.


C.

Develop a plan to upgrade technology.


D.

Define a process for monitoring risk.


Expert Solution
Questions # 343:

Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?

Options:

A.

Corporate incident escalation protocols are established.


B.

Exposure is integrated into the organization's risk profile.


C.

Risk appetite cascades to business unit management


D.

The organization-wide control budget is expanded.


Expert Solution
Questions # 344:

Which of the following is the BEST method of creating risk awareness in an organization?

Options:

A.

Marking the risk register available to project stakeholders


B.

Ensuring senior management commitment to risk training


C.

Providing regular communication to risk managers


D.

Appointing the risk manager from the business units


Expert Solution
Questions # 345:

Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?

Options:

A.

Al may result in less reliance on human intervention.


B.

Malicious activity may inadvertently be classified as normal during baselining.


C.

Risk assessments of heuristic security systems are more difficult.


D.

Predefined patterns of malicious activity may quickly become outdated.


Expert Solution
Questions # 346:

An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?

Options:

A.

Failure to test the disaster recovery plan (DRP)


B.

Failure to prepare a business continuity plan (BCP)


C.

Insufficient data captured in the business impact analysis (BIA)


D.

Insufficient definition of the recovery point objective (RPO)


Expert Solution
Questions # 347:

Which of the following functions independently reviews and provides feedback regarding the achievement of organizational objectives?

Options:

A.

Risk management


B.

Internal audit


C.

IT governance


D.

Senior leadership


Expert Solution
Questions # 348:

Which of the following will provide the BEST measure of compliance with IT policies?

Options:

A.

Evaluate past policy review reports.


B.

Conduct regular independent reviews.


C.

Perform penetration testing.


D.

Test staff on their compliance responsibilities.


Expert Solution
Questions # 349:

Which of the following BEST helps to identify significant events that could impact an organization?

Options:

A.

Control analysis


B.

Vulnerability analysis


C.

Scenario analysis


D.

Heat map analysis


Expert Solution
Questions # 350:

Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?

Options:

A.

Accountability may not be clearly defined.


B.

Risk ratings may be inconsistently applied.


C.

Different risk taxonomies may be used.


D.

Mitigation efforts may be duplicated.


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 301-350 out of questions