Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 8 out of 12 pages
Viewing questions 351-400 out of questions
Questions # 351:

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

Options:

A.

Collecting data for IT risk assessment


B.

Establishing and communicating the IT risk profile


C.

Utilizing a balanced scorecard


D.

Performing and publishing an IT risk analysis


Expert Solution
Questions # 352:
Options:

A.

Recovery point objective (RPO) of 48 hours


B.

Recovery time objective (RTO) of 48 hours


C.

Mean time between failures (MTBF) of 48 hours


D.

Mean time to recover (MTTR) of 48 hours


Expert Solution
Questions # 353:

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

Options:

A.

Code review


B.

Penetration test


C.

Gap assessment


D.

Business impact analysis (BIA)


Expert Solution
Questions # 354:

Which of the following is the MOST important enabler of effective risk management?

Options:

A.

User awareness of policies and procedures


B.

Implementation of proper controls


C.

Senior management support


D.

Continuous monitoring of threats and vulnerabilities


Expert Solution
Questions # 355:

An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?

Options:

A.

Migrate all data to another compliant service provider.


B.

Analyze the impact of the provider ' s control weaknesses to the business.


C.

Conduct a follow-up audit to verify the provider ' s control weaknesses.


D.

Review the contract to determine if penalties should be levied against the provider.


Expert Solution
Questions # 356:

Which of the following is the GREATEST risk to an organization when using a public AI system to process credit card transactions?

Options:

A.

Potential exposure of sensitive information


B.

Use of financial data to train the AI model


C.

Noncompliance with security standards


D.

AI hallucinations and bias


Expert Solution
Questions # 357:

A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?

Options:

A.

Risk forecasting


B.

Risk tolerance


C.

Risk likelihood


D.

Risk appetite


Expert Solution
Questions # 358:

Which of the following BEST indicates that an organization ' s risk management processes are mature?

Options:

A.

Risk policy is approved and communicated by the risk manager


B.

Annual risk awareness training is conducted by risk owners


C.

Risk principles are embedded within business operations and decisions


D.

The board regularly follows up on risk status and action plans


Expert Solution
Questions # 359:

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

Options:

A.

identifying risk scenarios.


B.

determining the risk strategy.


C.

calculating impact and likelihood.


D.

completing the controls catalog.


Expert Solution
Questions # 360:

The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:

Options:

A.

vendors providing risk assessments on time.


B.

vendor contracts reviewed in the past year.


C.

vendor risk mitigation action items completed on time.


D.

vendors that have reported control-related incidents.


Expert Solution
Questions # 361:
Options:

A.

Sensitive information classification and handling policies


B.

Anti-malware controls on endpoint devices


C.

Regular employee security awareness training


D.

An egress intrusion detection system (IDS)


Expert Solution
Questions # 362:

Which of the following is the MOST common concern associated with outsourcing to a service provider?

Options:

A.

Lack of technical expertise


B.

Combining incompatible duties


C.

Unauthorized data usage


D.

Denial of service attacks


Expert Solution
Questions # 363:

Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?

Options:

A.

Implement a fraud detection and prevention framework.


B.

Ensure the alignment of the organization ' s policies and standards to the defined risk appetite.


C.

Establish an enterprise-wide ethics training and awareness program.


D.

Perform a comprehensive review of all applicable legislative frameworks and requirements.


Expert Solution
Questions # 364:

An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:

Options:

A.

mitigation.


B.

avoidance.


C.

transfer.


D.

acceptance.


Expert Solution
Questions # 365:

An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?

Options:

A.

Assess the impact of applying the patches on the production environment.


B.

Survey other enterprises regarding their experiences with applying these patches.


C.

Seek information from the software vendor to enable effective application of the patches.


D.

Determine in advance an off-peak period to apply the patches.


Expert Solution
Questions # 366:

Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?

Options:

A.

Audit and compliance management


B.

The chief information officer (CIO) and the chief financial officer (CFO)


C.

Enterprise risk management and business process owners


D.

Executive management and the board of directors


Expert Solution
Questions # 367:

During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?

Options:

A.

Compare the residual risk to the current risk appetite.


B.

Recommend risk remediation of the ineffective controls.


C.

Implement key control indicators (KCIs).


D.

Escalate the control failures to senior management.


Expert Solution
Questions # 368:

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

Options:

A.

Sustained financial loss


B.

Cost of remediation efforts


C.

Duration of service outage


D.

Average time to recovery


Expert Solution
Questions # 369:

In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:

Options:

A.

system architecture in target areas.


B.

IT management policies and procedures.


C.

business objectives of the organization.


D.

defined roles and responsibilities.


Expert Solution
Questions # 370:

Which of the following BEST enables the identification of trends in risk levels?

Options:

A.

Correlation between risk levels and key risk indicators (KRIs) is positive.


B.

Measurements for key risk indicators (KRIs) are repeatable


C.

Quantitative measurements are used for key risk indicators (KRIs).


D.

Qualitative definitions for key risk indicators (KRIs) are used.


Expert Solution
Questions # 371:

Which of the following BEST reduces the likelihood of employees unintentionally disclosing sensitive information to outside parties?

Options:

A.

Regular employee security awareness training


B.

Sensitive information classification and handling policies


C.

Anti-malware controls on endpoint devices


D.

An egress intrusion detection system (IDS)


Expert Solution
Questions # 372:

Which of the following BEST enables an organization to increase the likelihood of identifying risk associated with unethical employee behavior?

Options:

A.

Require a signed agreement by employees to comply with ethics policies


B.

Conduct background checks for new employees


C.

Establish a channel to anonymously report unethical behavior


D.

Implement mandatory ethics training for employees


Expert Solution
Questions # 373:

A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?

Options:

A.

Business analyst


B.

Project sponsor


C.

IT project team


D.

IT project management office (PMO)


Expert Solution
Questions # 374:

The PRIMARY reason to implement a formalized risk taxonomy is to:

Options:

A.

reduce subjectivity in risk management.


B.

comply with regulatory requirements.


C.

demonstrate best industry practice.


D.

improve visibility of overall risk exposure.


Expert Solution
Questions # 375:

The objective of aligning mitigating controls to risk appetite is to ensure that:

Options:

A.

exposures are reduced to the fullest extent


B.

exposures are reduced only for critical business systems


C.

insurance costs are minimized


D.

the cost of controls does not exceed the expected loss.


Expert Solution
Questions # 376:

An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?

Options:

A.

The organization ' s business process owner


B.

The organization ' s information security manager


C.

The organization ' s vendor management officer


D.

The vendor ' s risk manager


Expert Solution
Questions # 377:

Which of the following would BEST help an enterprise prioritize risk scenarios?

Options:

A.

Industry best practices


B.

Placement on the risk map


C.

Degree of variances in the risk


D.

Cost of risk mitigation


Expert Solution
Questions # 378:

Which of the following is the MOST important reason to revisit a previously accepted risk?

Options:

A.

To update risk ownership


B.

To review the risk acceptance with new stakeholders


C.

To ensure risk levels have not changed


D.

To ensure controls are still operating effectively


Expert Solution
Questions # 379:

Which of the following is the GREATEST benefit of centralizing IT systems?

Options:

A.

Risk reporting


B.

Risk classification


C.

Risk monitoring


D.

Risk identification


Expert Solution
Questions # 380:

An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner ' s MOST important action related to this decision?

Options:

A.

Recommend risk remediation


B.

Change the level of risk appetite


C.

Document formal acceptance of the risk


D.

Reject the business initiative


Expert Solution
Questions # 381:

A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

Options:

A.

a root cause analysis is required


B.

controls are effective for ensuring continuity


C.

hardware needs to be upgraded


D.

no action is required as there was no impact


Expert Solution
Questions # 382:

A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner ' s BEST course of action when a compensating control needs to be applied?

Options:

A.

Obtain the risk owner ' s approval.


B.

Record the risk as accepted in the risk register.


C.

Inform senior management.


D.

update the risk response plan.


Expert Solution
Questions # 383:

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

Options:

A.

stakeholder risk tolerance.


B.

benchmarking criteria.


C.

suppliers used by the organization.


D.

the control environment.


Expert Solution
Questions # 384:

Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?

Options:

A.

Updating the risk register to include the risk mitigation plan


B.

Determining processes for monitoring the effectiveness of the controls


C.

Ensuring that control design reduces risk to an acceptable level


D.

Confirming to management the controls reduce the likelihood of the risk


Expert Solution
Questions # 385:

Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:

Options:

A.

inquire about the status of any planned corrective actions


B.

keep monitoring the situation as there is evidence that this is normal


C.

adjust the risk threshold to better reflect actual performance


D.

initiate corrective action to address the known deficiency


Expert Solution
Questions # 386:

An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager ' s BEST course of action?

Options:

A.

Review the risk of implementing versus postponing with stakeholders.


B.

Run vulnerability testing tools to independently verify the vulnerabilities.


C.

Review software license to determine the vendor ' s responsibility regarding vulnerabilities.


D.

Require the vendor to correct significant vulnerabilities prior to installation.


Expert Solution
Questions # 387:

Risk aggregation in a complex organization will be MOST successful when:

Options:

A.

using the same scales in assessing risk


B.

utilizing industry benchmarks


C.

using reliable qualitative data for risk Hems


D.

including primarily low-level risk factors


Expert Solution
Questions # 388:

Following an acquisition, the acquiring company ' s risk practitioner has been asked to update the organization ' s IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?

Options:

A.

Internal and external audit reports


B.

Risk disclosures in financial statements


C.

Risk assessment and risk register


D.

Business objectives and strategies


Expert Solution
Questions # 389:

An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner ' s BEST recommendation?

Options:

A.

Implement database activity and capacity monitoring.


B.

Ensure the business is aware of the risk.


C.

Ensure the enterprise has a process to detect such situations.


D.

Consider providing additional system resources to this job.


Expert Solution
Questions # 390:

Which of the following is the MOST valuable data source to support the optimization of an existing key risk indicator (KRI)?

Options:

A.

Frameworks and standards


B.

Industry benchmarks


C.

Organizational policies


D.

Historical losses and incidents


Expert Solution
Questions # 391:

Which of the following approaches BEST identifies information systems control deficiencies?

Options:

A.

Countermeasures analysis


B.

Best practice assessment


C.

Gap analysis


D.

Risk assessment


Expert Solution
Questions # 392:

The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:

Options:

A.

the risk strategy is appropriate


B.

KRIs and KPIs are aligned


C.

performance of controls is adequate


D.

the risk monitoring process has been established


Expert Solution
Questions # 393:

Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?

Options:

A.

Monitoring user activity using security logs


B.

Revoking access for users changing roles


C.

Granting access based on least privilege


D.

Conducting periodic reviews of authorizations granted


Expert Solution
Questions # 394:

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

Options:

A.

The program has not decreased threat counts.


B.

The program has not considered business impact.


C.

The program has been significantly revised


D.

The program uses non-customized training modules.


Expert Solution
Questions # 395:

When of the following 15 MOST important when developing a business case for a proposed security investment?

Options:

A.

identification of control requirements


B.

Alignment to business objectives


C.

Consideration of new business strategies


D.

inclusion of strategy for regulatory compliance


Expert Solution
Questions # 396:

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

Options:

A.

Limited blockchain adoption and support


B.

Reduced transaction speed and system responsiveness


C.

Reduced network integrity and availability


D.

Limited integration with external systems and blockchains


Expert Solution
Questions # 397:

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

Options:

A.

chief risk officer.


B.

project manager.


C.

chief information officer.


D.

business process owner.


Expert Solution
Questions # 398:

Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?

Options:

A.

Regulatory compliance


B.

Risk ownership


C.

Best practices


D.

Desired risk level


Expert Solution
Questions # 399:

Which of the following is MOST important to ensure when reviewing an organization ' s risk register?

Options:

A.

Risk ownership is recorded.


B.

Vulnerabilities have separate entries.


C.

Control ownership is recorded.


D.

Residual risk is less than inherent risk.


Expert Solution
Questions # 400:

Which of the following BEST enables an organization to address risk associated with technical complexity?

Options:

A.

Documenting system hardening requirements


B.

Minimizing dependency on technology


C.

Aligning with a security architecture


D.

Establishing configuration guidelines


Expert Solution
Viewing page 8 out of 12 pages
Viewing questions 351-400 out of questions