Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 351-400 out of questions
Questions # 351:

Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?

Options:

A.

Inability to access key information


B.

Complex security administration


C.

User resistance to single sign-on


D.

Single point of failure


Expert Solution
Questions # 352:

Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?

Options:

A.

Customer database manager


B.

Customer data custodian


C.

Data privacy officer


D.

Audit committee


Expert Solution
Questions # 353:

The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

Options:

A.

obtain the support of executive management.


B.

map the business processes to supporting IT and other corporate resources.


C.

identify critical business processes and the degree of reliance on support services.


D.

document the disaster recovery process.


Expert Solution
Questions # 354:

Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?

Options:

A.

Single loss expectancy (SLE)


B.

Cost of the information system


C.

Availability of additional compensating controls


D.

Potential business impacts are within acceptable levels


Expert Solution
Questions # 355:

Which of the following scenarios represents a threat?

Options:

A.

Connecting a laptop to a free, open, wireless access point (hotspot)


B.

Visitors not signing in as per policy


C.

Storing corporate data in unencrypted form on a laptop


D.

A virus transmitted on a USB thumb drive


Expert Solution
Questions # 356:

Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?

Options:

A.

To enable consistent data on risk to be obtained


B.

To allow for proper review of risk tolerance


C.

To identify dependencies for reporting risk


D.

To provide consistent and clear terminology


Expert Solution
Questions # 357:

Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?

Options:

A.

Reviewing password change history


B.

Performing periodic access recertification


C.

Conducting social engineering exercises


D.

Reviewing the results of security awareness surveys


Expert Solution
Questions # 358:

The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.

Question # 358

After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?

Options:

A.

Risk Impact Rating


B.

Risk Owner


C.

Risk Likelihood Rating


D.

Risk Exposure


Expert Solution
Questions # 359:

Who should be accountable for authorizing information system access to internal users?

Options:

A.

Information security officer


B.

Information security manager


C.

Information custodian


D.

Information owner


Expert Solution
Questions # 360:

An organization has adopted an emerging technology without following proper processes. Which of the following is the risk practitioner's BEST course of action to address this risk?

Options:

A.

Accept the risk because the technology has already been adopted.


B.

Propose a transfer of risk to a third party with subsequent monitoring.


C.

Conduct a risk assessment to determine risk exposure.


D.

Recommend to senior management to decommission the technology.


Expert Solution
Questions # 361:

During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?

Options:

A.

Include the new risk scenario in the current risk assessment.


B.

Postpone the risk assessment until controls are identified.


C.

Request the risk scenario be removed from the register.


D.

Exclude the new risk scenario from the current risk assessment


Expert Solution
Questions # 362:

Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?

Options:

A.

Designing compensating controls


B.

Determining if KRIs have been updated recently


C.

Assessing the effectiveness of the incident response plan


D.

Determining what has changed in the environment


Expert Solution
Questions # 363:

Which of the following would BEST help secure online financial transactions from improper users?

Options:

A.

Review of log-in attempts


B.

multi-level authorization


C.

Periodic review of audit trails


D.

multi-factor authentication


Expert Solution
Questions # 364:

Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?

Options:

A.

Multi-factor authentication


B.

Role-based access controls


C.

Activation of control audits


D.

Acceptable use policies


Expert Solution
Questions # 365:

An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do

FIRST?

Options:

A.

Confirm the vulnerabilities with the third party


B.

Identify procedures to mitigate the vulnerabilities.


C.

Notify information security management.


D.

Request IT to remove the system from the network.


Expert Solution
Questions # 366:

Several vulnerabilities have been identified in an organization’s core financial systems. Which of the following would be the risk practitioner’s BEST course of action?

Options:

A.

Evaluate the associated risk.


B.

Determine the cost of remediation.


C.

Initiate the incident response plan.


D.

Remediate the vulnerabilities.


Expert Solution
Questions # 367:

Which of the following is a drawback in the use of quantitative risk analysis?

Options:

A.

It assigns numeric values to exposures of assets.


B.

It requires more resources than other methods


C.

It produces the results in numeric form.


D.

It is based on impact analysis of information assets.


Expert Solution
Questions # 368:

Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?

Options:

A.

Perform an audit.


B.

Conduct a risk analysis.


C.

Develop risk scenarios.


D.

Perform a cost-benefit analysis.


Expert Solution
Questions # 369:

What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?

Options:

A.

Segment the system on its own network.


B.

Ensure regular backups take place.


C.

Virtualize the system in the cloud.


D.

Install antivirus software on the system.


Expert Solution
Questions # 370:
Options:

A.

Develop policies with less restrictive requirements to ensure consistency across the organization.


B.

Develop a global policy to be applied uniformly by each country.


C.

Develop country-specific policies to address local regulations.


D.

Develop a global policy that accommodates country-specific requirements.


Expert Solution
Questions # 371:

An organization has detected unauthorized logins to its client database servers. Which of the following should be of GREATEST concern?

Options:

A.

Potential increase in regulatory scrutiny


B.

Potential system downtime


C.

Potential theft of personal information


D.

Potential legal risk


Expert Solution
Questions # 372:

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?

Options:

A.

Postpone the risk assessment.


B.

Facilitate the exception process.


C.

Accept the manager's request.


D.

Reject the manager's request.


Expert Solution
Questions # 373:

Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?

Options:

A.

Conduct root cause analyses for risk events.


B.

Educate personnel on risk mitigation strategies.


C.

Integrate the risk event and incident management processes.


D.

Implement controls to prevent future risk events.


Expert Solution
Questions # 374:

Which of the following should be the GREATEST concern to a risk practitioner when process documentation is incomplete?

Options:

A.

Inability to allocate resources efficiently


B.

Inability to identify the risk owner


C.

Inability to complete the risk register


D.

Inability to identify process experts


Expert Solution
Questions # 375:

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

Options:

A.

Invoke the disaster recovery plan during an incident.


B.

Prepare a cost-benefit analysis of alternatives available


C.

Implement redundant infrastructure for the application.


D.

Reduce the recovery time by strengthening the response team.


Expert Solution
Questions # 376:

An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?

Options:

A.

Detective


B.

Deterrent


C.

Preventive


D.

Corrective


Expert Solution
Questions # 377:

Which of the following is the GREATEST benefit of a three lines of defense structure?

Options:

A.

An effective risk culture that empowers employees to report risk


B.

Effective segregation of duties to prevent internal fraud


C.

Clear accountability for risk management processes


D.

Improved effectiveness and efficiency of business operations


Expert Solution
Questions # 378:

An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?

Options:

A.

Implement IT systems in alignment with business objectives.


B.

Review metrics and key performance indicators (KPIs).


C.

Review design documentation of IT systems.


D.

Evaluate compliance with legal and regulatory requirements.


Expert Solution
Questions # 379:

Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?

Options:

A.

Perform a return on investment analysis.


B.

Review the risk register and risk scenarios.


C.

Calculate annualized loss expectancy of risk scenarios.


D.

Raise the maturity of organizational risk management.


Expert Solution
Questions # 380:

An organization is planning to implement a Zero Trust model. From a cybersecunty perspective, which of the following is MOST important to ensure successful alignment with the overall inten Zero Trust?

Options:

A.

Access policies


B.

Industry benchmarks


C.

Network compatibility


D.

Encryption algorithms


Expert Solution
Questions # 381:

An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:

Options:

A.

identify key risk indicators (KRls) for ongoing monitoring


B.

validate the CTO's decision with the business process owner


C.

update the risk register with the selected risk response


D.

recommend that the CTO revisit the risk acceptance decision.


Expert Solution
Questions # 382:

The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:

Options:

A.

rectify errors in results of KRIs.


B.

detect changes in the risk profile.


C.

reduce costs of risk mitigation controls.


D.

continually improve risk assessments.


Expert Solution
Questions # 383:

Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

Options:

A.

It maintains evidence of compliance with risk policy.


B.

It facilitates timely risk-based decisions.


C.

It validates the organization's risk appetite.


D.

It helps to mitigate internal and external risk factors.


Expert Solution
Questions # 384:

Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?

Options:

A.

The programming project leader solely reviews test results before approving the transfer to production.


B.

Test and production programs are in distinct libraries.


C.

Only operations personnel are authorized to access production libraries.


D.

A synchronized migration of executable and source code from the test environment to the production environment is allowed.


Expert Solution
Questions # 385:

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

Options:

A.

introduced into production without high-risk issues.


B.

having the risk register updated regularly.


C.

having key risk indicators (KRIs) established to measure risk.


D.

having an action plan to remediate overdue issues.


Expert Solution
Questions # 386:

Which of the following MOST effectively limits the impact of a ransomware attack?

Options:

A.

Cyber insurance


B.

Cryptocurrency reserve


C.

Data backups


D.

End user training


Expert Solution
Questions # 387:

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

Options:

A.

Replace the action owner with a more experienced individual.


B.

Implement compensating controls until the preferred action can be completed.


C.

Change the risk response strategy of the relevant risk to risk avoidance.


D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.


Expert Solution
Questions # 388:

When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?

Options:

A.

Before defining a framework


B.

During the risk assessment


C.

When evaluating risk response


D.

When updating the risk register


Expert Solution
Questions # 389:

Which of the following is MOST helpful when determining whether a system security control is effective?

Options:

A.

Control standard operating procedures


B.

Latest security assessment


C.

Current security threat report


D.

Updated risk register


Expert Solution
Questions # 390:

Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?

Options:

A.

An internal audit


B.

A heat map


C.

A business impact analysis (BIA)


D.

A vulnerability report


Expert Solution
Questions # 391:

During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:

Options:

A.

compensating controls are in place.


B.

a control mitigation plan is in place.


C.

risk management is effective.


D.

residual risk is accepted.


Expert Solution
Questions # 392:

An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?

Options:

A.

Database manager


B.

Public relations manager


C.

Data privacy manager


D.

Business manager


Expert Solution
Questions # 393:

What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?

Options:

A.

Reduce internal threats


B.

Reduce exposure to vulnerabilities


C.

Eliminate risk associated with personnel


D.

Ensure new hires have the required skills


Expert Solution
Questions # 394:

A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?

Options:

A.

Request a regulatory risk reporting methodology


B.

Require critical success factors (CSFs) for IT risks.


C.

Establish IT-specific compliance objectives


D.

Communicate IT key risk indicators (KRIs) and triggers


Expert Solution
Questions # 395:

IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would

be MOST helpful?

Options:

A.

IT risk register


B.

List of key risk indicators


C.

Internal audit reports


D.

List of approved projects


Expert Solution
Questions # 396:

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

Options:

A.

Continuous monitoring


B.

A control self-assessment


C.

Transaction logging


D.

Benchmarking against peers


Expert Solution
Questions # 397:

An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?

Options:

A.

Percentage of staff turnover following five consecutive days of leave


B.

Average number of consecutive days of leave per staff member


C.

Number of suspected malicious activities reported since policy implementation


D.

Financial loss incurred due to malicious activities since policy implementation


Expert Solution
Questions # 398:

Which of the following should be given the HIGHEST priority when developing a response plan for risk assessment results?

Options:

A.

Risk that has been untreated


B.

Items with a high inherent risk


C.

Items with the highest likelihood of occurrence


D.

Risk that exceeds risk appetite


Expert Solution
Questions # 399:

Which of the following is MOST useful input when developing risk scenarios?

Options:

A.

Common attacks in other industries.


B.

Identification of risk events.


C.

Impact on critical assets.


D.

Probability of disruptive risk events.


Expert Solution
Questions # 400:

The PRIMARY advantage of implementing an IT risk management framework is the:

Options:

A.

establishment of a reliable basis for risk-aware decision making.


B.

compliance with relevant legal and regulatory requirements.


C.

improvement of controls within the organization and minimized losses.


D.

alignment of business goals with IT objectives.


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 351-400 out of questions