Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 7 out of 12 pages
Viewing questions 301-350 out of questions
Questions # 301:

Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?

Options:

A.

Community cloud


B.

Private cloud


C.

Hybrid cloud


D.

Public cloud


Expert Solution
Questions # 302:

Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?

Options:

A.

Likelihood rating


B.

Control effectiveness


C.

Assessment approach


D.

Impact rating


Expert Solution
Questions # 303:

Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?

Options:

A.

Adopting qualitative enterprise risk assessment methods


B.

Linking IT risk scenarios to technology objectives


C.

linking IT risk scenarios to enterprise strategy


D.

Adopting quantitative enterprise risk assessment methods


Expert Solution
Questions # 304:

Which of the following is the BEST method to track asset inventory?

Options:

A.

Periodic asset review by management


B.

Asset registration form


C.

Automated asset management software


D.

IT resource budgeting process


Expert Solution
Questions # 305:

Which of the following is MOST important to promoting a risk-aware culture?

Options:

A.

Regular testing of risk controls


B.

Communication of audit findings


C.

Procedures for security monitoring


D.

Open communication of risk reporting


Expert Solution
Questions # 306:

An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner ' s BEST course of action?

Options:

A.

Report the observation to the chief risk officer (CRO).


B.

Validate the adequacy of the implemented risk mitigation measures.


C.

Update the risk register with the implemented risk mitigation actions.


D.

Revert the implemented mitigation measures until approval is obtained


Expert Solution
Questions # 307:

Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?

Options:

A.

Business impact assessment (BIA)


B.

Key performance indicators (KPIs)


C.

Risk profile


D.

Industry benchmark analysis


Expert Solution
Questions # 308:

The FIRST task when developing a business continuity plan should be to:

Options:

A.

determine data backup and recovery availability at an alternate site.


B.

identify critical business functions and resources.


C.

define roles and responsibilities for implementation.


D.

identify recovery time objectives (RTOs) for critical business applications.


Expert Solution
Questions # 309:

Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?

Options:

A.

Transfer the risk.


B.

Perform a gap analysis.


C.

Determine risk appetite for the new regulation.


D.

Implement specific monitoring controls.


Expert Solution
Questions # 310:

During a data loss incident, which role in the RACI chart would be aligned to the risk practitioner?

Options:

A.

Responsible


B.

Accountable


C.

Informed


D.

Consulted


Expert Solution
Questions # 311:

Which types of controls are BEST used to minimize the risk associated with a vulnerability?

Options:

A.

Detective


B.

Preventive


C.

Deterrent


D.

Directive


Expert Solution
Questions # 312:

A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?

Options:

A.

Peak demand on the cloud service during business hours


B.

Percentage of technology upgrades resulting in security breaches


C.

Number of incidents with downtime exceeding contract threshold


D.

Percentage of servers not patched per policy


Expert Solution
Questions # 313:

The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

Options:

A.

obtain the support of executive management.


B.

map the business processes to supporting IT and other corporate resources.


C.

identify critical business processes and the degree of reliance on support services.


D.

document the disaster recovery process.


Expert Solution
Questions # 314:

What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?

Options:

A.

Source information is acquired at stable cost.


B.

Source information is tailored by removing outliers.


C.

Source information is readily quantifiable.


D.

Source information is consistently available.


Expert Solution
Questions # 315:

Which of the following activities is PRIMARILY the responsibility of senior management?

Options:

A.

Bottom-up identification of emerging risks


B.

Categorization of risk scenarios against a standard taxonomy


C.

Prioritization of risk scenarios based on severity


D.

Review of external loss data


Expert Solution
Questions # 316:

Which of the following BEST enables the recovery of data that has been encrypted by a ransomware attack?

Options:

A.

Recovering from the previous backup cycle


B.

Using built-in immutable backups


C.

Verifying data after backups


D.

Backing up data using multiple types of media


Expert Solution
Questions # 317:

An IT license audit has revealed that there are several unlicensed copies of co be to:

Options:

A.

immediately uninstall the unlicensed software from the laptops


B.

centralize administration rights on laptops so that installations are controlled


C.

report the issue to management so appropriate action can be taken.


D.

procure the requisite licenses for the software to minimize business impact.


Expert Solution
Questions # 318:

Which of the following is MOST helpful in providing an overview of an organization ' s risk management program?

Options:

A.

Risk management treatment plan


B.

Risk assessment results


C.

Risk management framework


D.

Risk register


Expert Solution
Questions # 319:

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner ' s BEST course of action?

Options:

A.

Collaborate with the risk owner to determine the risk response plan.


B.

Document the gap in the risk register and report to senior management.


C.

Include a right to audit clause in the service provider contract.


D.

Advise the risk owner to accept the risk.


Expert Solution
Questions # 320:

The PRIMARY benefit associated with key risk indicators (KRls) is that they:

Options:

A.

help an organization identify emerging threats.


B.

benchmark the organization ' s risk profile.


C.

identify trends in the organization ' s vulnerabilities.


D.

enable ongoing monitoring of emerging risk.


Expert Solution
Questions # 321:

Which of the following contributes MOST to the effective implementation of risk responses?

Options:

A.

Clear understanding of the risk


B.

Comparable industry risk trends


C.

Appropriate resources


D.

Detailed standards and procedures


Expert Solution
Questions # 322:

Which of the following functions independently reviews and provides feedback regarding the achievement of organizational objectives?

Options:

A.

Risk management


B.

Internal audit


C.

IT governance


D.

Senior leadership


Expert Solution
Questions # 323:

In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?

Options:

A.

A standardized risk taxonomy


B.

A list of control deficiencies


C.

An enterprise risk ownership policy


D.

An updated risk tolerance metric


Expert Solution
Questions # 324:

Which of the following BEST indicates the effectiveness of anti-malware software?

Options:

A.

Number of staff hours lost due to malware attacks


B.

Number of downtime hours in business critical servers


C.

Number of patches made to anti-malware software


D.

Number of successful attacks by malicious software


Expert Solution
Questions # 325:

Which of the following BEST reduces the probability of laptop theft?

Options:

A.

Cable lock


B.

Acceptable use policy


C.

Data encryption


D.

Asset tag with GPS


Expert Solution
Questions # 326:

Which of the following would be MOST effective in monitoring changes in an organization ' s IT risk environment?

Options:

A.

Lagging indicators


B.

Risk mitigation plans


C.

Industry regulatory reports


D.

Risk inventory


Expert Solution
Questions # 327:

Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?

Options:

A.

Percentage of high-risk vulnerabilities missed


B.

Number of high-risk vulnerabilities outstanding


C.

Defined thresholds for high-risk vulnerabilities


D.

Percentage of high-risk vulnerabilities addressed


Expert Solution
Questions # 328:

A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

Business application owner


B.

Business continuity manager


C.

Chief risk officer (CRO)


D.

IT infrastructure manager


Expert Solution
Questions # 329:

Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

Options:

A.

It maintains evidence of compliance with risk policy.


B.

It facilitates timely risk-based decisions.


C.

It validates the organization ' s risk appetite.


D.

It helps to mitigate internal and external risk factors.


Expert Solution
Questions # 330:

An organization plans to implement a new AI application, but the risk practitioner learns that IT policies do not address AI. Which of the following would be the risk practitioner ' s GREATEST concern?

Options:

A.

Lack of direction for AI usage


B.

Increased reliance on shadow IT


C.

Complexity of AI implementation


D.

Lack of best practices for AI implementation


Expert Solution
Questions # 331:

Which of the following should be an element of the risk appetite of an organization?

Options:

A.

The effectiveness of compensating controls


B.

The enterprise ' s capacity to absorb loss


C.

The residual risk affected by preventive controls


D.

The amount of inherent risk considered appropriate


Expert Solution
Questions # 332:

The BEST indication that risk management is effective is when risk has been reduced to meet:

Options:

A.

risk levels.


B.

risk budgets.


C.

risk appetite.


D.

risk capacity.


Expert Solution
Questions # 333:

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

Options:

A.

risk mitigation approach


B.

cost-benefit analysis.


C.

risk assessment results.


D.

vulnerability assessment results


Expert Solution
Questions # 334:

Which of the following is the PRIMARY reason to update a risk register with risk assessment results?

Options:

A.

To communicate the level and priority of assessed risk to management


B.

To provide a comprehensive inventory of risk across the organization


C.

To assign a risk owner to manage the risk


D.

To enable the creation of action plans to address nsk


Expert Solution
Questions # 335:

A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization ' s data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?

Options:

A.

Request a policy exception from senior management.


B.

Comply with the organizational policy.


C.

Report the noncompliance to the local regulatory agency.


D.

Request an exception from the local regulatory agency.


Expert Solution
Questions # 336:

Which of the following should be done FIRST when a new risk scenario has been identified

Options:

A.

Estimate the residual risk.


B.

Establish key risk indicators (KRIs).


C.

Design control improvements.


D.

Identify the risk owner.


Expert Solution
Questions # 337:

Which of the following is a risk practitioner ' s BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?

Options:

A.

Redesign key risk indicators (KRIs).


B.

Update risk responses.


C.

Conduct a SWOT analysis.


D.

Perform a threat assessment.


Expert Solution
Questions # 338:

It is MOST important that security controls for a new system be documented in:

Options:

A.

testing requirements


B.

the implementation plan.


C.

System requirements


D.

The security policy


Expert Solution
Questions # 339:

Which of the following is the GREATEST risk associated with inappropriate classification of data?

Options:

A.

Inaccurate record management data


B.

Inaccurate recovery time objectives (RTOs)


C.

Lack of accountability for data ownership


D.

Users having unauthorized access to data


Expert Solution
Questions # 340:

During the creation of an organization ' s IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:

Options:

A.

Interviewing data owners


B.

Reviewing risk response plans with internal audit


C.

Developing a risk monitoring process


D.

Reviewing an external risk assessment


Expert Solution
Questions # 341:

Which of the following is the MOST important metric to monitor the performance of the change management process?

Options:

A.

Percentage of changes having separation of duties in code deployment


B.

Percentage of changes having completed post-implementation verification


C.

Percentage of changes having user acceptance testing (UAT) sign-off


D.

Percentage of changes having to invoke the rollback plan


Expert Solution
Questions # 342:

A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:

Options:

A.

updating the risk register


B.

documenting the risk scenarios.


C.

validating the risk scenarios


D.

identifying risk mitigation controls.


Expert Solution
Questions # 343:

Which of the following would provide the MOST objective assessment of the effectiveness of an organization ' s security controls?

Options:

A.

An internal audit


B.

Security operations center review


C.

Internal penetration testing


D.

A third-party audit


Expert Solution
Questions # 344:

Recovery the objectives (RTOs) should be based on

Options:

A.

minimum tolerable downtime


B.

minimum tolerable loss of data.


C.

maximum tolerable downtime.


D.

maximum tolerable loss of data


Expert Solution
Questions # 345:

Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?

Options:

A.

Mean time to recover (MTTR)


B.

IT system criticality classification


C.

Incident management service level agreement (SLA)


D.

Recovery time objective (RTO)


Expert Solution
Questions # 346:

A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?

Options:

A.

Include an indemnification clause in the provider ' s contract.


B.

Monitor provider performance against service level agreements (SLAs).


C.

Purchase cyber insurance to protect against data breaches.


D.

Ensure appropriate security controls are in place through independent audits.


Expert Solution
Questions # 347:

Which of the following is MOST important for managing ethical risk?

Options:

A.

Involving senior management in resolving ethical disputes


B.

Developing metrics to trend reported ethics violations


C.

Identifying the ethical concerns of each stakeholder


D.

Establishing a code of conduct for employee behavior


Expert Solution
Questions # 348:

Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?

Options:

A.

Applying risk treatments


B.

Implementing internal controls


C.

Monitoring risk responses


D.

Providing assurance of control effectiveness


Expert Solution
Questions # 349:

Which of the following would provide the MOST useful information for communicating an organization’s risk level to senior management?

Options:

A.

A list of organizational threats


B.

A high-level risk map


C.

Specialized risk publications


D.

A list of organizational vulnerabilities


Expert Solution
Questions # 350:

Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?

Options:

A.

Segregation of duties


B.

Monetary approval limits


C.

Clear roles and responsibilities


D.

Password policies


Expert Solution
Viewing page 7 out of 12 pages
Viewing questions 301-350 out of questions