Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 351-400 out of questions
Questions # 351:

Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?

Options:

A.

impact due to failure of control


B.

Frequency of failure of control


C.

Contingency plan for residual risk


D.

Cost-benefit analysis of automation


Expert Solution
Questions # 352:

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

Options:

A.

Sharing company information on social media


B.

Sharing personal information on social media


C.

Using social media to maintain contact with business associates


D.

Using social media for personal purposes during working hours


Expert Solution
Questions # 353:

Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:

Options:

A.

a process for measuring and reporting control performance.


B.

an alternate control design in case of failure of the identified control.


C.

a process for bypassing control procedures in case of exceptions.


D.

procedures to ensure the effectiveness of the control.


Expert Solution
Questions # 354:

Which of the following MOST effectively limits the impact of a ransomware attack?

Options:

A.

Cyber insurance


B.

Cryptocurrency reserve


C.

Data backups


D.

End user training


Expert Solution
Questions # 355:

Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?

Options:

A.

Management has not determined a final implementation date.


B.

Management has not completed an early mitigation milestone.


C.

Management has not secured resources for mitigation activities.


D.

Management has not begun the implementation.


Expert Solution
Questions # 356:

An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?

Options:

A.

Acquisition


B.

Implementation


C.

Initiation


D.

Operation and maintenance


Expert Solution
Questions # 357:

Which of the following BEST mitigates ethical risk?

Options:

A.

Ethics committees


B.

Contingency scenarios


C.

Awareness of consequences for violations


D.

Routine changes in senior management


Expert Solution
Questions # 358:

Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?

Options:

A.

To better understand inherent and residual risk within the organization


B.

To gain objective insight into the effectiveness and efficiency of controls


C.

To demonstrate compliance with regulatory and legal control requirements


D.

To facilitate timely and accurate updates to the risk register


Expert Solution
Questions # 359:

Which of the following is the BEST way to assess the effectiveness of an access management process?

Options:

A.

Comparing the actual process with the documented process


B.

Reviewing access logs for user activity


C.

Reconciling a list of accounts belonging to terminated employees


D.

Reviewing for compliance with acceptable use policy


Expert Solution
Questions # 360:

What is senior management's role in the RACI model when tasked with reviewing monthly status reports provided by risk owners?

Options:

A.

Accountable


B.

Informed


C.

Responsible


D.

Consulted


Expert Solution
Questions # 361:

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

Options:

A.

To identify threats introduced by business processes


B.

To identify risk when personal information is collected


C.

To ensure senior management has approved the use of personal information


D.

To ensure compliance with data privacy laws and regulations


Expert Solution
Questions # 362:

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r

Options:

A.

Prepare a business case for the response options.


B.

Identify resources for implementing responses.


C.

Develop a mechanism for monitoring residual risk.


D.

Update the risk register with the results.


Expert Solution
Questions # 363:

Who should be responsible for strategic decisions on risk management?

Options:

A.

Chief information officer (CIO)


B.

Executive management team


C.

Audit committee


D.

Business process owner


Expert Solution
Questions # 364:

Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization's:

Options:

A.

risk classification methods


B.

risk-based capital allocation


C.

risk portfolio


D.

risk culture


Expert Solution
Questions # 365:

An IT risk practitioner has been tasked to engage key stakeholders to assess risk for key IT risk scenarios. Which of the following is the PRIMARY benefit of this activity?

Options:

A.

Establishing the available risk mitigation budget


B.

Verifying the relevance of risk ratings


C.

Demonstrating compliance to regulatory bodies


D.

Assessing IT risk management culture


Expert Solution
Questions # 366:

Which of the following is MOST helpful to understand the consequences of an IT risk event?

Options:

A.

Fault tree analysis


B.

Historical trend analysis


C.

Root cause analysis


D.

Business impact analysis (BIA)


Expert Solution
Questions # 367:

Which of the following is the BEST approach for determining whether a risk action plan is effective?

Options:

A.

Comparing the remediation cost against budget


B.

Assessing changes in residual risk


C.

Assessing the inherent risk


D.

Monitoring changes of key performance indicators(KPIs)


Expert Solution
Questions # 368:

Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?

Options:

A.

Scalable infrastructure


B.

A hot backup site


C.

Transaction limits


D.

Website activity monitoring


Expert Solution
Questions # 369:

A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?

Options:

A.

IT security managers


B.

IT control owners


C.

IT auditors


D.

IT risk owners


Expert Solution
Questions # 370:

Which of the following will be the GREATEST concern when assessing the risk profile of an organization?

Options:

A.

The risk profile was not updated after a recent incident


B.

The risk profile was developed without using industry standards.


C.

The risk profile was last reviewed two years ago.


D.

The risk profile does not contain historical loss data.


Expert Solution
Questions # 371:

Which of the following would provide the MOST comprehensive information for updating an organization's risk register?

Options:

A.

Results of the latest risk assessment


B.

Results of a risk forecasting analysis


C.

A review of compliance regulations


D.

Findings of the most recent audit


Expert Solution
Questions # 372:

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

Options:

A.

Do not collect or retain data that is not needed.


B.

Redact data where possible.


C.

Limit access to the personal data.


D.

Ensure all data is encrypted at rest and during transit.


Expert Solution
Questions # 373:

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

Options:

A.

Implement segregation of duties.


B.

Enforce an internal data access policy.


C.

Enforce the use of digital signatures.


D.

Apply single sign-on for access control.


Expert Solution
Questions # 374:

A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

IT infrastructure manager


B.

Chief Risk Officer (CRO)


C.

Business continuity manager


D.

Business application owner


Expert Solution
Questions # 375:

An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?

Options:

A.

Review the risk identification process.


B.

Inform the risk scenario owners.


C.

Create a risk awareness communication plan.


D.

Update the risk register.


Expert Solution
Questions # 376:

A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?

Options:

A.

Risk forecasting


B.

Risk tolerance


C.

Risk likelihood


D.

Risk appetite


Expert Solution
Questions # 377:

Which of the following is MOST important when developing risk scenarios?

Options:

A.

The scenarios are based on industry best practice.


B.

The scenarios focus on current vulnerabilities.


C.

The scenarios are relevant to the organization.


D.

The scenarios include technical consequences.


Expert Solution
Questions # 378:

What is the PRIMARY reason to periodically review key performance indicators (KPIs)?

Options:

A.

Ensure compliance.


B.

Identify trends.


C.

Promote a risk-aware culture.


D.

Optimize resources needed for controls


Expert Solution
Questions # 379:

Which of the following is the BEST way to identify changes in the risk profile of an organization?

Options:

A.

Monitor key risk indicators (KRIs).


B.

Monitor key performance indicators (KPIs).


C.

Interview the risk owner.


D.

Conduct a gap analysis


Expert Solution
Questions # 380:

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

Options:

A.

network operations.


B.

the cybersecurity function.


C.

application development.


D.

the business function.


Expert Solution
Questions # 381:

Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?

Options:

A.

KCIs are independent from KRIs KRIs.


B.

KCIs and KRIs help in determining risk appetite.


C.

KCIs are defined using data from KRIs.


D.

KCIs provide input for KRIs


Expert Solution
Questions # 382:

Who is MOST appropriate to be assigned ownership of a control

Options:

A.

The individual responsible for control operation


B.

The individual informed of the control effectiveness


C.

The individual responsible for resting the control


D.

The individual accountable for monitoring control effectiveness


Expert Solution
Questions # 383:

Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?

Options:

A.

Data processing


B.

Data quality


C.

Data scalability


D.

Data governance


Expert Solution
Questions # 384:

Which of the following is the BEST metric to measure the effectiveness of an organization's disaster recovery program?

Options:

A.

Percentage of applications subject to disaster recovery tests


B.

Number of personnel dedicated to the disaster recovery program


C.

Number of disaster recovery tests performed per year


D.

Percentage of systems meeting defined recovery objectives


Expert Solution
Questions # 385:

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?

Options:

A.

To measure business exposure to risk


B.

To identify control vulnerabilities


C.

To monitor the achievement of set objectives


D.

To raise awareness of operational issues


Expert Solution
Questions # 386:

Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?

Options:

A.

Verifying that project objectives are met


B.

Identifying project cost overruns


C.

Leveraging an independent review team


D.

Reviewing the project initiation risk matrix


Expert Solution
Questions # 387:

Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?

Options:

A.

Key risk indicators (KRIs)


B.

The owner of the financial reporting process


C.

The risk rating of affected financial processes


D.

The list of relevant financial controls


Expert Solution
Questions # 388:

Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?

Options:

A.

Cloud service provider


B.

IT department


C.

Senior management


D.

Business unit owner


Expert Solution
Questions # 389:

Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?

Options:

A.

Inherent risk and likelihood


B.

Management action plans associated with audit findings


C.

Residual risk relative to appetite and tolerance


D.

Key risk indicator (KRI) trends


Expert Solution
Questions # 390:

Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?

Options:

A.

Unencrypted data


B.

Lack of redundant circuits


C.

Low bandwidth connections


D.

Data integrity


Expert Solution
Questions # 391:
Options:

A.

Average time to contain security incidents


B.

Percentage of systems being monitored


C.

Number of false positives reported


D.

Number of personnel dedicated to security monitoring


Expert Solution
Questions # 392:

Which of the following groups represents the first line of defense?

Options:

A.

Internal audit


B.

Compliance committee


C.

External audit


D.

Operational managers


Expert Solution
Questions # 393:

Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?

Options:

A.

It provides assurance of timely business process response and effectiveness.


B.

It supports effective use of resources and provides reasonable confidence of recoverability.


C.

It enables effective BCP maintenance and updates to reflect organizational changes.


D.

It decreases the risk of downtime and operational losses in the event of a disruption.


Expert Solution
Questions # 394:

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

Options:

A.

Standard operating procedures


B.

SWOT analysis


C.

Industry benchmarking


D.

Control gap analysis


Expert Solution
Questions # 395:

Which of the following would BEST help an enterprise define and communicate its risk appetite?

Options:

A.

Gap analysis


B.

Risk assessment


C.

Heat map


D.

Risk register


Expert Solution
Questions # 396:

Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?

Options:

A.

Increased time to remediate vulnerabilities


B.

Inaccurate reporting of results


C.

Increased number of vulnerabilities


D.

Network performance degradation


Expert Solution
Questions # 397:

A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Identify new risk entries to include in ERM.


B.

Remove the risk entries from the ERM register.


C.

Re-perform the risk assessment to confirm results.


D.

Verify the adequacy of risk monitoring plans.


Expert Solution
Questions # 398:

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

Options:

A.

Increase in the frequency of changes


B.

Percent of unauthorized changes


C.

Increase in the number of emergency changes


D.

Average time to complete changes


Expert Solution
Questions # 399:

An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?

Options:

A.

Number of customer records held


B.

Number of databases that host customer data


C.

Number of encrypted customer databases


D.

Number of staff members having access to customer data


Expert Solution
Questions # 400:

Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?

Options:

A.

Updating the risk register to include the risk mitigation plan


B.

Determining processes for monitoring the effectiveness of the controls


C.

Ensuring that control design reduces risk to an acceptable level


D.

Confirming to management the controls reduce the likelihood of the risk


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 351-400 out of questions