Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?
#1201
Isaca's CRISC A key performance indicator (KPI) has been established to monitor the number of software changes that fail and must be re-implemented. An increase in the KPI indicates an ineffective:
#1202
Isaca's CRISC Which strategy employed by risk management would BEST help to prevent internal fraud?
#1203
Isaca's CRISC Which of the following is the MOST effective way to identify changes in the performance of the control environment?
#1204
Isaca's CRISC An organization is planning a project to replace several complex manual controls with automated processes. Which of the following is the risk practitioner's MOST important course of action?
#1205
Isaca's CRISC A risk assessment of an organization’s architecture reveals that the middleware systems have a severe vulnerability that could compromise the confidentiality of record processing. Which of the following is the risk practitioner's BEST course of action?
#1206
Isaca's CRISC Which of the following is MOST important when planning to implement a Software as a Service (SaaS) application to manage information?
#1207
Isaca's CRISC Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (AI) solution?
#1208
Isaca's CRISC An organization is considering the adoption of an aggressive business strategy to achieve desired growth. From a risk management perspective, what should the risk practitioner do NEXT?
#1209
Isaca's CRISC Which of the following provides the BEST indication of risk management maturity?
#1210
Isaca's CRISC Which of the following is the MOST important document regarding the treatment of sensitive data?
#1211
Isaca's CRISC In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
#1212
Isaca's CRISC In response to recent security incidents, the IT risk management team is promoting a global security plan that defines controls to be implemented in multiple regions. Which of the following BEST enables the successful deployment of this plan?
#1213
Isaca's CRISC Which of the following is the BEST criteria to determine whether a control environment is effective?
#1214
Isaca's CRISC Which of the following is the PRIMARY objective of aggregating the impact of IT risk scenarios and reflecting the results in the enterprise risk register?
#1215
Isaca's CRISC An IT risk threat analysis is BEST used to establish:
#1216
Isaca's CRISC A risk practitioner has been asked to mark an identified control deficiency as remediated, despite concerns that the risk level is still too high. Which of the following is the BEST way to address this concern?
#1217
Isaca's CRISC An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
#1218
Isaca's CRISC Which of the following criteria is MOST important to include in an agreement with a penetration testing vendor?
#1219
Isaca's CRISC Which of the following is the GREATEST risk associated with a blockchain implementation?
#1220
Isaca's CRISC Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
#1221
Isaca's CRISC Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
#1222
Isaca's CRISC An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?
#1223
Isaca's CRISC Which of the following is the BEST method for assessing the current effectiveness of an organization’s risk management program against its desired level of capability?
#1224
Isaca's CRISC An organization has decided to migrate its critical system database containing customer information to branches located in other countries. Which of the following should be of MOST concern regarding the migration?
#1225
Isaca's CRISC Where should a risk practitioner document the current state and desired future state of organizational risk?
#1226
Isaca's CRISC Which of the following would BEST prevent an unscheduled application of a patch?
#1227
Isaca's CRISC Which of the following is MOST likely to trigger the need for a risk reassessment?
#1228
Isaca's CRISC The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:
#1229
Isaca's CRISC Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?
#1230