Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
#811
Isaca's CRISC Which of the following would provide the MOST objective assessment of the effectiveness of an organization's security controls?
#812
Isaca's CRISC Which of the following is the MOST important information to be communicated during security awareness training?
#813
Isaca's CRISC Which of the following is the GREATEST critical success factor (CSF) of an IT risk management program?
#814
Isaca's CRISC Which of the following should be the risk practitioner's FIRST course of action when an organization has decided to expand into new product areas?
#815
Isaca's CRISC Which of the following BEST supports the management of identified risk scenarios?
#816
Isaca's CRISC A risk practitioner observed that a high number of policy exceptions were approved by senior management. Which of the following is the risk practitioner's BEST course of action to determine root cause?
#817
Isaca's CRISC An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:
#818
Isaca's CRISC A global company's business continuity plan (BCP) requires the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
#819
Isaca's CRISC Which of the following will MOST effectively align IT controls with corporate risk tolerance?
#820
Isaca's CRISC Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization's IT systems via personal or public computers?
#821
Isaca's CRISC Which of the following is the MOST important success factor when introducing risk management in an organization?
#822
Isaca's CRISC When developing risk scenarios using a list of generic scenarios based on industry best practices, it is MOST important to:
#823
Isaca's CRISC The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:
#824
Isaca's CRISC Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?
#825
Isaca's CRISC Which of the following should be the FIRST step to investigate an IT monitoring system that has a decreasing alert rate?
#826
Isaca's CRISC When formulating a social media policy to address information leakage, which of the following is the MOST important concern to address?
#827
Isaca's CRISC Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?
#828
Isaca's CRISC Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?
#829
Isaca's CRISC Which of the following is the BEST way to address a board's concern about the organization's cybersecurity posture?
#830
Isaca's CRISC Which of the following is MOST influential when management makes risk response decisions?
#831
Isaca's CRISC Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
#832
Isaca's CRISC Which of the following is the MOST important component of effective security incident response?
#833
Isaca's CRISC An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
#834
Isaca's CRISC When is the BEST time to identify risk associated with major projects to determine a mitigation plan?
#835
Isaca's CRISC Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
#836
Isaca's CRISC Which of the following is MOST important to include in a risk assessment of an emerging technology?
#837
Isaca's CRISC Which of the following would MOST electively reduce risk associated with an increased volume of online transactions on a retailer website?
#838
Isaca's CRISC Which of the following is MOST important to consider when determining the value of an asset during the risk identification process?
#839
Isaca's CRISC Risk acceptance of an exception to a security control would MOST likely be justified when:
#840