Isaca's CRISC An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
#421
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would be MOST helpful?
#422
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
#423
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?
#424
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following approaches will BEST help to ensure the effectiveness of risk awareness training?
#425
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
#426
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
#427
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
#428
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
#429
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager's BEST approach to this request before sharing the register?
#430
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST effective against external threats to an organization's confidential information?
#431
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
#432
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
#433
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC The GREATEST concern when maintaining a risk register is that:
#434
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would BEST help an enterprise prioritize risk scenarios?
#435
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST useful when communicating risk to management?
#436
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following should be the PRIMARY input when designing IT controls?
#437
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner's BEST course of action when a compensating control needs to be applied?
#438
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?
#439
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following should be the HIGHEST priority when developing a risk response?
#440
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Risk mitigation procedures should include:
#441
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
#442
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
#443
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC The MAIN purpose of having a documented risk profile is to:
#444
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
#445
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?
#446
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST critical to the design of relevant risk scenarios?
#447
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following will BEST mitigate the risk associated with IT and business misalignment?
#448
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
#449
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?