Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the Isaca Isaca Certification CRISC Questions and answers with CertsForce

Viewing page 9 out of 12 pages
Viewing questions 401-450 out of questions
Questions # 401:

Which of the following is MOST important to consider when determining a recovery time objective (RTO)?

Options:

A.

Time between backups for critical data


B.

Sensitivity of business data involved


C.

Cost of downtime due to a disaster


D.

Maximum tolerable data loss after an incident


Expert Solution
Questions # 402:

Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?

Options:

A.

Published vulnerabilities relevant to the business


B.

Threat actors that can trigger events


C.

Events that could potentially impact the business


D.

IT assets requiring the greatest investment


Expert Solution
Questions # 403:

Which of the following is the MOST reliable validation of a new control?

Options:

A.

Approval of the control by senior management


B.

Complete and accurate documentation of control objectives


C.

Control owner attestation of control effectiveness


D.

Internal audit review of control design


Expert Solution
Questions # 404:

The MAIN goal of the risk analysis process is to determine the:

Options:

A.

potential severity of impact


B.

frequency and magnitude of loss


C.

control deficiencies


D.

threats and vulnerabilities


Expert Solution
Questions # 405:

After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to

Options:

A.

recommend a program that minimizes the concerns of that production system.


B.

inform the process owner of the concerns and propose measures to reduce them.


C.

inform the IT manager of the concerns and propose measures to reduce them.


D.

inform the development team of the concerns and together formulate risk reduction measures.


Expert Solution
Questions # 406:

Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:

Options:

A.

communicate risk trends to stakeholders.


B.

assign ownership of emerging risk scenarios.


C.

highlight noncompliance with the risk policy


D.

identify threats to emerging technologies.


Expert Solution
Questions # 407:

The percentage of unpatched systems is a:

Options:

A.

threat vector.


B.

critical success factor (CSF).


C.

key performance indicator (KPI).


D.

key risk indicator (KRI).


Expert Solution
Questions # 408:

A new international data privacy regulation requires personal data to be

disposed after the specified retention period, which is different from the local

regulatory requirement. Which of the following is the risk practitioner ' s

BEST course of action?

Options:

A.

The application code has not been version controlled.


B.

Knowledge of the applications is limited to few employees.


C.

An IT project manager is not assigned to oversee development.


D.

Controls are not applied to the applications.


Expert Solution
Questions # 409:

The MAIN purpose of conducting a control self-assessment (CSA) is to:

Options:

A.

gain a better understanding of the control effectiveness in the organization


B.

gain a better understanding of the risk in the organization


C.

adjust the controls prior to an external audit


D.

reduce the dependency on external audits


Expert Solution
Questions # 410:

A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?

Options:

A.

Preventive


B.

Detective


C.

Directive


D.

Deterrent


Expert Solution
Questions # 411:

IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:

Options:

A.

the cost associated with each control.


B.

historical risk assessments.


C.

key risk indicators (KRls).


D.

information from the risk register.


Expert Solution
Questions # 412:

Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?

Options:

A.

Inability to access key information


B.

Complex security administration


C.

User resistance to single sign-on


D.

Single point of failure


Expert Solution
Questions # 413:

Which of the following provides the MOST useful information to determine risk exposure following control implementations?

Options:

A.

Strategic plan and risk management integration


B.

Risk escalation and process for communication


C.

Risk limits, thresholds, and indicators


D.

Policies, standards, and procedures


Expert Solution
Questions # 414:

Who should be responsible (of evaluating the residual risk after a compensating control has been

Options:

A.

Compliance manager


B.

Risk owner


C.

Control owner


D.

Risk practitioner


Expert Solution
Questions # 415:

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?

Options:

A.

Number of users that participated in the DRP testing


B.

Number of issues identified during DRP testing


C.

Percentage of applications that met the RTO during DRP testing


D.

Percentage of issues resolved as a result of DRP testing


Expert Solution
Questions # 416:

Which of the following BEST supports ethical IT risk management practices?

Options:

A.

Robust organizational communication channels


B.

Mapping of key risk indicators (KRIs) to corporate strategy


C.

Capability maturity models integrated with risk management frameworks


D.

Rigorously enforced operational service level agreements (SLAs)


Expert Solution
Questions # 417:

What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?

Options:

A.

Potential loss to tie business due to non-performance of the asset


B.

Known emerging environmental threats


C.

Known vulnerabilities published by the asset developer


D.

Cost of replacing the asset with a new asset providing similar services


Expert Solution
Questions # 418:

Which of the following is MOST useful when communicating risk to management?

Options:

A.

Risk policy


B.

Audit report


C.

Risk map


D.

Maturity model


Expert Solution
Questions # 419:

A risk assessment has been completed on an application and reported to the application owner. The report includes validated vulnerability findings that require mitigation. Which of the following should be the NEXT step?

Options:

A.

Report the findings to executive management to enable treatment decisions.


B.

Reassess each vulnerability to evaluate the risk profile of the application.


C.

Conduct a penetration test to determine how to mitigate the vulnerabilities.


D.

Prepare a risk response that is aligned to the organization ' s risk tolerance.


Expert Solution
Questions # 420:

After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:

Options:

A.

prepare a follow-up risk assessment.


B.

recommend acceptance of the risk scenarios.


C.

reconfirm risk tolerance levels.


D.

analyze changes to aggregate risk.


Expert Solution
Questions # 421:

Which of the following BEST helps to balance the costs and benefits of managing IT risk?

Options:

A.

Prioritizing risk responses


B.

Evaluating risk based on frequency and probability


C.

Considering risk factors that can be quantified


D.

Managing the risk by using controls


Expert Solution
Questions # 422:

Which of the following is the BEST way to identify changes in the risk profile of an organization?

Options:

A.

Monitor key risk indicators (KRIs).


B.

Monitor key performance indicators (KPIs).


C.

Interview the risk owner.


D.

Conduct a gap analysis


Expert Solution
Questions # 423:

Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?

Options:

A.

The outsourcing of related IT processes


B.

Outcomes of periodic risk assessments


C.

Changes in service level objectives


D.

Findings from continuous monitoring


Expert Solution
Questions # 424:

An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?

Options:

A.

Prepare a cost-benefit analysis to evaluate relocation.


B.

Prepare a disaster recovery plan (DRP).


C.

Conduct a business impact analysis (BIA) for an alternate location.


D.

Develop a business continuity plan (BCP).


Expert Solution
Questions # 425:

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

Options:

A.

Validating employee social media accounts and passwords


B.

Monitoring Internet usage on employee workstations


C.

Disabling social media access from the organization ' s technology


D.

Implementing training and awareness programs


Expert Solution
Questions # 426:

Well-developed, data-driven risk measurements should be:

Options:

A.

reflective of the lowest organizational level.


B.

a data feed taken directly from operational production systems.


C.

reported to management the same day data is collected.


D.

focused on providing a forward-looking view.


Expert Solution
Questions # 427:

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

Options:

A.

Transborder data transfer restrictions


B.

Differences in regional standards


C.

Lack of monitoring over vendor activities


D.

Lack of after-hours incident management support


Expert Solution
Questions # 428:

Which of the following provides the BEST indication that existing controls are effective?

Options:

A.

Control testing


B.

Control logging


C.

Control documentation


D.

Control design


Expert Solution
Questions # 429:

Which of the following is the BEST method to identify unnecessary controls?

Options:

A.

Evaluating the impact of removing existing controls


B.

Evaluating existing controls against audit requirements


C.

Reviewing system functionalities associated with business processes


D.

Monitoring existing key risk indicators (KRIs)


Expert Solution
Questions # 430:

The GREATEST concern when maintaining a risk register is that:

Options:

A.

impacts are recorded in qualitative terms.


B.

executive management does not perform periodic reviews.


C.

IT risk is not linked with IT assets.


D.

significant changes in risk factors are excluded.


Expert Solution
Questions # 431:

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

Options:

A.

data logging and monitoring


B.

data mining and analytics


C.

data classification and labeling


D.

data retention and destruction


Expert Solution
Questions # 432:

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

Options:

A.

Monitoring risk responses


B.

Applying risk treatments


C.

Providing assurance of control effectiveness


D.

Implementing internal controls


Expert Solution
Questions # 433:

An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?

Options:

A.

The number of users who can access sensitive data


B.

A list of unencrypted databases which contain sensitive data


C.

The reason some databases have not been encrypted


D.

The cost required to enforce encryption


Expert Solution
Questions # 434:

Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?

Options:

A.

Threat landscape


B.

Risk appetite


C.

Risk register


D.

Risk metrics


Expert Solution
Questions # 435:

Which of the following is MOST important when discussing risk within an organization?

Options:

A.

Adopting a common risk taxonomy


B.

Using key performance indicators (KPIs)


C.

Creating a risk communication policy


D.

Using key risk indicators (KRIs)


Expert Solution
Questions # 436:

An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?

Options:

A.

Acceptance


B.

Avoidance


C.

Transfer


D.

Reduction


Expert Solution
Questions # 437:

Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?

Options:

A.

Risk monitoring


B.

Risk mitigation


C.

Risk aggregation


D.

Risk assessment


Expert Solution
Questions # 438:

Which of the following would be a risk practitioner ' $ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?

Options:

A.

Manage cyber risk according to the organization ' s risk management framework.


B.

Define cyber roles and responsibilities across the organization


C.

Conduct cyber risk awareness training tailored specifically for senior management


D.

Implement a cyber risk program based on industry best practices


Expert Solution
Questions # 439:

Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?

Options:

A.

Testing the transmission of credit card numbers


B.

Reviewing logs for unauthorized data transfers


C.

Configuring the DLP control to block credit card numbers


D.

Testing the DLP rule change control process


Expert Solution
Questions # 440:

Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?

Options:

A.

Establish baseline security configurations with the cloud service provider.


B.

Require the cloud prowler 10 disclose past data privacy breaches.


C.

Ensure the cloud service provider performs an annual risk assessment.


D.

Specify cloud service provider liability for data privacy breaches in the contract


Expert Solution
Questions # 441:

Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?

Options:

A.

The business case for the use of loT


B.

The loT threat landscape


C.

Policy development for loT


D.

The network that loT devices can access


Expert Solution
Questions # 442:

During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?

Options:

A.

Test system reliability and performance.


B.

Adopt an Agile development approach.


C.

Conduct user acceptance testing (UAT).


D.

Adopt a phased changeover approach.


Expert Solution
Questions # 443:

If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?

Options:

A.

Confidentiality


B.

Accountability


C.

Availability


D.

Integrity


Expert Solution
Questions # 444:

Which of the following provides the BEST level of assurance to an organization that its vendors ' controls are effective?

Options:

A.

Control matrix documentation


B.

Vendor security reports


C.

Service Level Agreement (SLA)


D.

An independent third-party audit


Expert Solution
Questions # 445:

Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?

Options:

A.

The criticality of the asset


B.

The monetary value of the asset


C.

The vulnerability profile of the asset


D.

The size of the asset ' s user base


Expert Solution
Questions # 446:

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

Options:

A.

Control effectiveness


B.

Risk appetite


C.

Risk likelihood


D.

Key risk indicator (KRI)


Expert Solution
Questions # 447:

An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:

Options:

A.

procedures to monitor the operation of controls.


B.

a tool for monitoring critical activities and controls.


C.

real-time monitoring of risk events and control exceptions.


D.

monitoring activities for all critical assets.


E.

Perform a controls assessment.


Expert Solution
Questions # 448:

When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?

Options:

A.

Acceptance


B.

Mitigation


C.

Transfer


D.

Avoidance


Expert Solution
Questions # 449:

Which of the following controls will BEST mitigate risk associated with excessive access privileges?

Options:

A.

Review of user access logs


B.

Frequent password expiration


C.

Separation of duties


D.

Entitlement reviews


Expert Solution
Questions # 450:

Key risk indicators (KRIs) BEST support risk treatment when they:

Options:

A.

Set performance expectations for controls.


B.

Align with key business objectives.


C.

Indicate that the risk is approaching predefined thresholds.


D.

Articulate likelihood and impact in quantitative terms.


Expert Solution
Viewing page 9 out of 12 pages
Viewing questions 401-450 out of questions