Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC Which of the following roles should be assigned accountability for monitoring risk levels?
#1051
Isaca's CRISC A MAJOR advantage of using key risk indicators (KRIs) is that they:
#1052
Isaca's CRISC Which of the following is a risk practitioner’s BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
#1053
Isaca's CRISC An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner’s recommendation?
#1054
Isaca's CRISC Who is the BEST person to authorize access privileges to database tables for an application system used to process employee personal data?
#1055
Isaca's CRISC Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan?
#1056
Isaca's CRISC A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
#1057
Isaca's CRISC A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
#1058
Isaca's CRISC Which of the following is performed after a risk assessment is completed?
#1059
Isaca's CRISC A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?
#1060
Isaca's CRISC Which of the following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?
#1061
Isaca's CRISC Which of the following would provide the BEST evidence of an effective internal control environment?
#1062
Isaca's CRISC Which of the following has the GREATEST influence on an organization’s risk appetite?
#1063
Isaca's CRISC Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?
#1064
Isaca's CRISC Which of the following is the PRIMARY objective of establishing an organization’s risk tolerance and appetite?
#1065
Isaca's CRISC Which of the following is the MOST effective way to identify an application backdoor prior to implementation?
#1066
Isaca's CRISC Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
#1067
Isaca's CRISC After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?
#1068
Isaca's CRISC Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?
#1069
Isaca's CRISC The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
#1070
Isaca's CRISC Which of the following is the PRIMARY objective of maintaining an information asset inventory?
#1071
Isaca's CRISC Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?
#1072
Isaca's CRISC Which of the following is MOST likely to deter an employee from engaging in inappropriate use of company-owned IT systems?
#1073
Isaca's CRISC Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
#1074
Isaca's CRISC The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
#1075
Isaca's CRISC Which of the following is the BEST approach for selecting controls to minimize risk?
#1076
Isaca's CRISC Which of the following provides the MOST reliable evidence of a control’s effectiveness?
#1077
Isaca's CRISC An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
#1078
Isaca's CRISC An organization has experienced a cyber attack that exposed customer personally identifiable information (PII) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
#1079
Isaca's CRISC Who is MOST important to include in the assessment of existing IT risk scenarios?
#1080