Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?
#901
Isaca's CRISC An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management's decision?
#902
Isaca's CRISC Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?
#903
Isaca's CRISC Which of the following should be the PRIMARY basis for prioritizing two risk scenarios related to network service disruption that have the same impact?
#904
Isaca's CRISC In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
#905
Isaca's CRISC Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
#906
Isaca's CRISC Which of the following should be the PRIMARY basis for the development of an IT risk scenario?
#907
Isaca's CRISC An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?
#908
Isaca's CRISC Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
#909
Isaca's CRISC Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
#910
Isaca's CRISC A vendor manager reports that a previously compliant service provider had issues with its most recent security audit. Which of the following is the MOST important course of action?
#911
Isaca's CRISC Which of the following is a corrective control?
#912
Isaca's CRISC Which of the following elements of a risk register is MOST useful to share with key stakeholders to influence informed decision-making?
#913
Isaca's CRISC Which of the following elements is MOST essential when creating risk scenarios?
#914
Isaca's CRISC When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:
#915
Isaca's CRISC What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?
#916
Isaca's CRISC Which of the following is MOST likely to be identified from an information systems audit report?
#917
Isaca's CRISC Which of the following would MOST effectively mitigate the risk of data loss when production data is being used in a testing environment?
#918
Isaca's CRISC Which of the following MOST effectively enables senior management to communicate risk appetite?
#919
Isaca's CRISC Which activity would BEST enable a risk manager to verify the scope of responsibilities for stakeholders in IT risk scenarios?
#920
Isaca's CRISC Which of the following provides the MOST useful input when developing IT risk scenarios?
#921
Isaca's CRISC What is the PRIMARY purpose of reporting residual risk from two consecutive IT risk assessments to management?
#922
Isaca's CRISC Which of the following should be of MOST concern to a risk practitioner reviewing a recent audit report of an organization's data center?
#923
Isaca's CRISC Which of the following is the BEST way to mitigate the risk of inappropriate access to personally identifiable information (PII) by third-party cloud service personnel?
#924
Isaca's CRISC An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis. Which of the following is theMOST important control to ensure the privacy of customer information?
#925
Isaca's CRISC Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
#926
Isaca's CRISC An information security manager has advocated for the purchase of a data loss prevention (DLP) system to reduce the impact of a potential data breach. Which of the following is the BEST way for the risk practitioner to support this recommendation?
#927
Isaca's CRISC As part of its vendor management program, an organization has commissioned an audit of a vendor's control framework for the purpose of implementing compensating controls into its environment. Which risk response option has been decided?
#928
Isaca's CRISC Which of the following would be MOST helpful to management when reviewing enterprise risk appetite and tolerance?
#929
Isaca's CRISC Which of the following are the MOST important inputs when determining the desired state of IT risk during gap analysis?
#930