Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 7 out of 11 pages
Viewing questions 301-350 out of questions
Questions # 301:

During an organization's simulated phishing email campaign, which of the following is the BEST indicator of a mature security awareness program?

Options:

A.

A high number of participants reporting the email


B.

A high number of participants deleting the email


C.

A low number of participants with questions for the help desk


D.

A low number of participants opening the email


Expert Solution
Questions # 302:

Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?

Options:

A.

It contains vulnerabilities and threats.


B.

The risk methodology is intellectual property.


C.

Contents may be used as auditable findings.


D.

Risk scenarios may be misinterpreted.


Expert Solution
Questions # 303:

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

Options:

A.

The network security policy


B.

Potential business impact


C.

The WiFi access point configuration


D.

Planned remediation actions


Expert Solution
Questions # 304:

Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?

Options:

A.

Cyber threat intelligence


B.

Anti-malware software


C.

Endpoint detection and response (EDR)


D.

SIEM systems


Expert Solution
Questions # 305:

Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?

Options:

A.

Variances between organizational risk appetites


B.

Different taxonomies to categorize risk scenarios


C.

Disparate platforms for governance, risk, and compliance (GRC) systems


D.

Dissimilar organizational risk acceptance protocols


Expert Solution
Questions # 306:

Which of the following BEST enables effective risk-based decision making?

Options:

A.

Performing threat modeling to understand the threat landscape


B.

Minimizing the number of risk scenarios for risk assessment


C.

Aggregating risk scenarios across a key business unit


D.

Ensuring the risk register is updated to reflect changes in risk factors


Expert Solution
Questions # 307:

Which of the following provides the MOST useful information when developing a risk profile for management approval?

Options:

A.

Residual risk and risk appetite


B.

Strength of detective and preventative controls


C.

Effectiveness and efficiency of controls


D.

Inherent risk and risk tolerance


Expert Solution
Questions # 308:

An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?

Options:

A.

Lack of cross-functional risk assessment workshops within the organization


B.

Lack of common understanding of the organization's risk culture


C.

Lack of quantitative methods to aggregate the total risk exposure


D.

Lack of an integrated risk management system to aggregate risk scenarios


Expert Solution
Questions # 309:

Which of The following BEST represents the desired risk posture for an organization?

Options:

A.

Inherent risk is lower than risk tolerance.


B.

Operational risk is higher than risk tolerance.


C.

Accepted risk is higher than risk tolerance.


D.

Residual risk is lower than risk tolerance.


Expert Solution
Questions # 310:

Which of the following is MOST important for an organization that wants to reduce IT operational risk?

Options:

A.

Increasing senior management's understanding of IT operations


B.

Increasing the frequency of data backups


C.

Minimizing complexity of IT infrastructure


D.

Decentralizing IT infrastructure


Expert Solution
Questions # 311:

Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?

Options:

A.

Analyzing risk appetite and tolerance levels


B.

Assessing identified risk and recording results in the risk register


C.

Evaluating risk scenarios and assessing current controls


D.

Reviewing guidance from industry best practices and standards


Expert Solution
Questions # 312:

Which of the following is the BEST indicator of an effective IT security awareness program?

Options:

A.

Decreased success rate of internal phishing tests


B.

Decreased number of reported security incidents


C.

Number of disciplinary actions issued for security violations


D.

Number of employees that complete security training


Expert Solution
Questions # 313:

An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?

Options:

A.

Identify staff members who have access to the organization's sensitive data.


B.

Identify locations where the organization's sensitive data is stored.


C.

Identify risk scenarios and owners associated with possible data loss vectors.


D.

Identify existing data loss controls and their levels of effectiveness.


Expert Solution
Questions # 314:

Which of the following should be the MAIN consideration when validating an organization's risk appetite?

Options:

A.

Comparison against regulations


B.

Maturity of the risk culture


C.

Capacity to withstand loss


D.

Cost of risk mitigation options


Expert Solution
Questions # 315:

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

Options:

A.

avoided.


B.

accepted.


C.

mitigated.


D.

transferred.


Expert Solution
Questions # 316:

A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?

Options:

A.

Risk impact


B.

Risk trend


C.

Risk appetite


D.

Risk likelihood


Expert Solution
Questions # 317:

Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?

Options:

A.

Prepare a report for senior management.


B.

Assign responsibility and accountability for the incident.


C.

Update the risk register.


D.

Avoid recurrence of the incident.


Expert Solution
Questions # 318:

Which of the following is MOST important to consider when determining a recovery time objective (RTO)?

Options:

A.

Time between backups for critical data


B.

Sensitivity of business data involved


C.

Cost of downtime due to a disaster


D.

Maximum tolerable data loss after an incident


Expert Solution
Questions # 319:

Which of the following is the MOST important consideration when prioritizing risk response?

Options:

A.

Requirements for regulatory obligations.


B.

Cost of control implementation.


C.

Effectiveness of risk treatment.


D.

Number of risk response options.


Expert Solution
Questions # 320:

A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?

Options:

A.

implement code reviews and Quality assurance on a regular basis


B.

Verity me software agreement indemnifies the company from losses


C.

Review the source coda and error reporting of the application


D.

Update the software with the latest patches and updates


Expert Solution
Questions # 321:

Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?

Options:

A.

Risk register


B.

Risk appetite


C.

Risk priorities


D.

Risk heat maps


Expert Solution
Questions # 322:

Which of the following would BEST help to ensure that suspicious network activity is identified?

Options:

A.

Analyzing intrusion detection system (IDS) logs


B.

Analyzing server logs


C.

Using a third-party monitoring provider


D.

Coordinating events with appropriate agencies


Expert Solution
Questions # 323:

An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?

Options:

A.

Include a nondisclosure agreement (NDA) for personal data in the contract.


B.

Implement a digital rights protection tool to monitor data.


C.

Use a virtual private network (VPN) to communicate data.


D.

Transfer a read-only version of the data.


Expert Solution
Questions # 324:

A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?

Options:

A.

Peak demand on the cloud service during business hours


B.

Percentage of technology upgrades resulting in security breaches


C.

Number of incidents with downtime exceeding contract threshold


D.

Percentage of servers not patched per policy


Expert Solution
Questions # 325:

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

Options:

A.

A decrease in control layering effectiveness


B.

An increase in inherent risk


C.

An increase in control vulnerabilities


D.

An increase in the level of residual risk


Expert Solution
Questions # 326:

Which of the following is the MOST effective way to mitigate identified risk scenarios?

Options:

A.

Assign ownership of the risk response plan


B.

Provide awareness in early detection of risk.


C.

Perform periodic audits on identified risk.


D.

areas Document the risk tolerance of the organization.


Expert Solution
Questions # 327:

A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?

Options:

A.

Consult with industry peers regarding cloud best practices.


B.

Evaluate adherence to existing IT policies and standards.


C.

Determine gaps between the current state and target framework.


D.

Adopt an industry-leading cloud computing framework.


Expert Solution
Questions # 328:

Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?

Options:

A.

Benchmarking parameters likely to affect the results


B.

Tools and techniques used by risk owners to perform the assessments


C.

A risk heat map with a summary of risk identified and assessed


D.

The possible impact of internal and external risk factors on the assessment results


Expert Solution
Questions # 329:

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

Options:

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.


B.

Implement a key performance indicator (KPI) to monitor the existing control performance.


C.

Accept the residual risk in its entirety and obtain executive management approval.


D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.


Expert Solution
Questions # 330:

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

Options:

A.

Key risk indicators (KRls)


B.

Inherent risk


C.

Residual risk


D.

Risk appetite


Expert Solution
Questions # 331:

Who is the MOST appropriate owner for newly identified IT risk?

Options:

A.

The manager responsible for IT operations that will support the risk mitigation efforts


B.

The individual with authority to commit organizational resources to mitigate the risk


C.

A project manager capable of prioritizing the risk remediation efforts


D.

The individual with the most IT risk-related subject matter knowledge


Expert Solution
Questions # 332:

Which of the following is a specific concern related to machine learning algorithms?

Options:

A.

Low software quality


B.

Lack of access controls


C.

Data breaches


D.

Data bias


Expert Solution
Questions # 333:

Which of the following would BEST provide early warning of a high-risk condition?

Options:

A.

Risk register


B.

Risk assessment


C.

Key risk indicator (KRI)


D.

Key performance indicator (KPI)


Expert Solution
Questions # 334:

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

Options:

A.

Segregation of duties


B.

Three lines of defense


C.

Compliance review


D.

Quality assurance review


Expert Solution
Questions # 335:

Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?

Options:

A.

Audit engagement letter


B.

Risk profile


C.

IT risk register


D.

Change control documentation


Expert Solution
Questions # 336:

Which of the following is the BEST way for an organization to enable risk treatment decisions?

Options:

A.

Allocate sufficient funds for risk remediation.


B.

Promote risk and security awareness.


C.

Establish clear accountability for risk.


D.

Develop comprehensive policies and standards.


Expert Solution
Questions # 337:

The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?

Options:

A.

Perform a root cause analysis


B.

Perform a code review


C.

Implement version control software.


D.

Implement training on coding best practices


Expert Solution
Questions # 338:

An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?

Options:

A.

Require the vendor to degauss the hard drives


B.

Implement an encryption policy for the hard drives.


C.

Require confirmation of destruction from the IT manager.


D.

Use an accredited vendor to dispose of the hard drives.


Expert Solution
Questions # 339:

The MAIN goal of the risk analysis process is to determine the:

Options:

A.

potential severity of impact


B.

frequency and magnitude of loss


C.

control deficiencies


D.

threats and vulnerabilities


Expert Solution
Questions # 340:

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

Options:

A.

Complete an offsite business continuity exercise.


B.

Conduct a compliance check against standards.


C.

Perform a vulnerability assessment.


D.

Measure the change in inherent risk.


Expert Solution
Questions # 341:

Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?

Options:

A.

Procedures for risk assessments on IT assets


B.

An IT asset management checklist


C.

An IT asset inventory populated by an automated scanning tool


D.

A plan that includes processes for the recovery of IT assets


Expert Solution
Questions # 342:

In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?

Options:

A.

Potential benefits from use of Al solutions


B.

Monitoring techniques required for AI solutions


C.

Changes to existing infrastructure to support Al solutions


D.

Skills required to support Al solutions


Expert Solution
Questions # 343:

A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?

Options:

A.

Appropriate approvals for the control changes


B.

The reason the action plan was modified


C.

The risk owner's approval of the revised action plan


D.

The effectiveness of the resulting control


Expert Solution
Questions # 344:

Which of the following would BEST facilitate the maintenance of data classification requirements?

Options:

A.

Scheduling periodic audits


B.

Assigning a data custodian


C.

Implementing technical controls over the assets


D.

Establishing a data loss prevention (DLP) solution


Expert Solution
Questions # 345:

An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?

Options:

A.

Qualitative method


B.

Industry calibration method


C.

Threat-based method


D.

Quantitative method


Expert Solution
Questions # 346:

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

Options:

A.

Methods of attack progression


B.

Losses incurred by industry peers


C.

Most recent antivirus scan reports


D.

Potential impact of events


Expert Solution
Questions # 347:

A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?

Options:

A.

Consistent forms to document risk acceptance rationales


B.

Acceptable scenarios to override risk appetite or tolerance thresholds


C.

Individuals or roles authorized to approve risk acceptance


D.

Communication protocols when a risk is accepted


Expert Solution
Questions # 348:

Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?

Options:

A.

Risk management


B.

Business units


C.

External audit


D.

Internal audit


Expert Solution
Questions # 349:

Of the following, who should be responsible for determining the inherent risk rating of an application?

Options:

A.

Application owner


B.

Senior management


C.

Risk practitioner


D.

Business process owner


Expert Solution
Questions # 350:

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

Options:

A.

A privacy impact assessment has not been completed.


B.

Data encryption methods apply to a subset of Pll obtained.


C.

The data privacy officer was not consulted.


D.

Insufficient access controls are used on the loT devices.


Expert Solution
Viewing page 7 out of 11 pages
Viewing questions 301-350 out of questions