Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC A new regulatory requirement imposes severe fines for data leakage involving customers' personally identifiable information (PII). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?
#751
Isaca's CRISC As part of business continuity planning, which of the following is MOST important to include in a business impact analysis (BIA)?
#752
Isaca's CRISC When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?
#753
Isaca's CRISC Which of the following is the MOST important activity when identifying relevant risk data?
#754
Isaca's CRISC An organization has made a decision to purchase a new IT system. During which phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
#755
Isaca's CRISC From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
#756
Isaca's CRISC Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
#757
Isaca's CRISC Who should be responsible for strategic decisions on risk management?
#758
Isaca's CRISC Which of the following would be the GREATEST concern for an IT risk practitioner when an employee has transferred to another department?
#759
Isaca's CRISC An organization is planning to implement a guest wireless network granting internet access only. Which of the following is the MOST important consideration to effectively mitigate the risk of guests gaining access to the organization's internal network?
#760
Isaca's CRISC Which of the following should be determined FIRST when a new security vulnerability is made public?
#761
Isaca's CRISC When should be a risk practitioner's PRIMARY focus when evaluating a proposed robotic process automation of a business service?
#762
Isaca's CRISC Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?
#763
Isaca's CRISC Which of the following is the MOST important data attribute of key risk indicators (KRIs)?
#764
Isaca's CRISC What should a risk practitioner do FIRST when a shadow IT application is identified in a business owner's business impact analysis (BIA)?
#765
Isaca's CRISC An organization is planning to move its application infrastructure from on-premise to the cloud. Which of the following is the BEST course of action to address the risk associated with data transfer if the relationship is terminated with the vendor?
#766
Isaca's CRISC Which of the following would BEST mitigate an identified risk scenario?
#767
Isaca's CRISC Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
#768
Isaca's CRISC Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
#769
Isaca's CRISC A risk practitioner has been asked to recommend a key performance indicator (KPI) to assess the effectiveness of a manual process to terminate user access.Which of the following is the BEST KPI to recommend?
#770
Isaca's CRISC Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?
#771
Isaca's CRISC Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
#772
Isaca's CRISC A key risk indicator (KRI) flags an exception for exceeding a threshold but remains within risk appetite. Which of the following should be done NEXT?
#773
Isaca's CRISC An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
#774
Isaca's CRISC An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate this risk?
#775
Isaca's CRISC Which of the following contributes MOST to the effective implementation of risk responses?
#776
Isaca's CRISC Which of the following BEST indicates the risk appetite and tolerance level for the risk associated with business interruption caused by IT system failures?
#777
Isaca's CRISC Which of the following is the MOST important consideration when developing risk strategies?
#778
Isaca's CRISC Which of the following would BEST facilitate the implementation of data classification requirements?
#779
Isaca's CRISC An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning ownership of the associated risk entries?
#780