Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC Which of the following BEST balances the costs and benefits of managing IT risk?
#1141
Isaca's CRISC Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
#1142
Isaca's CRISC Which of the following BEST enables effective IT control implementation?
#1143
Isaca's CRISC An organization recently acquired a new business division. Which of the following is MOST likely to be affected?
#1144
Isaca's CRISC One of an organization’s key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner’s BEST recommendation?
#1145
Isaca's CRISC Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
#1146
Isaca's CRISC An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:
#1147
Isaca's CRISC Which of the following would MOST likely cause management to unknowingly accept excessive risk?
#1148
Isaca's CRISC Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
#1149
Isaca's CRISC What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?
#1150
Isaca's CRISC Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?
#1151
Isaca's CRISC A recent regulatory requirement has the potential to affect an organization’s use of a third party to supply outsourced business services. Which of the following is the BEST course of action?
#1152
Isaca's CRISC A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner’s BEST course of action?
#1153
Isaca's CRISC Which of the following BEST enables a risk practitioner to understand management's approach to organizational risk?
#1154
Isaca's CRISC An organization has been experiencing an increasing number of spear phishing attacks. Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?
#1155
Isaca's CRISC A poster has been displayed in a data center that reads, “Anyone caught taking photographs in the data center may be subject to disciplinary action.” Which of the following control types has been implemented?
#1156
Isaca's CRISC Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?
#1157
Isaca's CRISC Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database?
#1158
Isaca's CRISC Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?
#1159
Isaca's CRISC Which of the following provides the BEST assurance of the effectiveness of vendor security controls?
#1160
Isaca's CRISC A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?
#1161
Isaca's CRISC Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
#1162
Isaca's CRISC An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?
#1163
Isaca's CRISC Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?
#1164
Isaca's CRISC Which of the following is the GREATEST benefit of using IT risk scenarios?
#1165
Isaca's CRISC Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?
#1166
Isaca's CRISC Which of the following is the BEST evidence of the effectiveness of a security awareness program?
#1167
Isaca's CRISC Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?
#1168
Isaca's CRISC Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
#1169
Isaca's CRISC Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?
#1170