Isaca's CRISC Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
#691
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is a KEY consideration for a risk practitioner to communicate to senior management evaluating the introduction of artificial intelligence (AI) solutions into the organization?
#692
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been:
#693
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC To communicate the risk associated with IT in business terms, which of the following MUST be defined?
#694
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
#695
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST important to the successful development of IT risk scenarios?
#696
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC While reviewing an organization's monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially. Which of the following would be the BEST approach for the risk practitioner to take?
#697
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following MUST be updated to maintain an IT risk register?
#698
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
#699
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
#700
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?
#701
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST important when developing risk scenarios?
#702
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?
#703
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the GREATEST risk associated with the misclassification of data?
#704
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
#705
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
#706
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
#707
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
#708
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following represents a vulnerability?
#709
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC An organization has detected unauthorized logins to its client database servers. Which of the following should be of GREATEST concern?
#710
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
#711
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would be a risk practitioner's BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?
#712
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following practices would be MOST effective in protecting personally identifiable information (PII) from unauthorized access in a cloud environment?
#713
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the BEST way for an organization to enable risk treatment decisions?
#714
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the BEST method of creating risk awareness in an organization?
#715
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
#716
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
#717
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the BEST metric to demonstrate the effectiveness of an organization's software testing program?
#718
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
#719
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?