Isaca's CRISC Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?
#1201
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC A key performance indicator (KPI) has been established to monitor the number of software changes that fail and must be re-implemented. An increase in the KPI indicates an ineffective:
#1202
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which strategy employed by risk management would BEST help to prevent internal fraud?
#1203
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the MOST effective way to identify changes in the performance of the control environment?
#1204
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC An organization is planning a project to replace several complex manual controls with automated processes. Which of the following is the risk practitioner's MOST important course of action?
#1205
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC A risk assessment of an organization’s architecture reveals that the middleware systems have a severe vulnerability that could compromise the confidentiality of record processing. Which of the following is the risk practitioner's BEST course of action?
#1206
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST important when planning to implement a Software as a Service (SaaS) application to manage information?
#1207
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (AI) solution?
#1208
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC An organization is considering the adoption of an aggressive business strategy to achieve desired growth. From a risk management perspective, what should the risk practitioner do NEXT?
#1209
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following provides the BEST indication of risk management maturity?
#1210
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the MOST important document regarding the treatment of sensitive data?
#1211
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
#1212
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC In response to recent security incidents, the IT risk management team is promoting a global security plan that defines controls to be implemented in multiple regions. Which of the following BEST enables the successful deployment of this plan?
#1213
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the BEST criteria to determine whether a control environment is effective?
#1214
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the PRIMARY objective of aggregating the impact of IT risk scenarios and reflecting the results in the enterprise risk register?
#1215
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC An IT risk threat analysis is BEST used to establish:
#1216
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC A risk practitioner has been asked to mark an identified control deficiency as remediated, despite concerns that the risk level is still too high. Which of the following is the BEST way to address this concern?
#1217
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
#1218
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following criteria is MOST important to include in an agreement with a penetration testing vendor?
#1219
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the GREATEST risk associated with a blockchain implementation?
#1220
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
#1221
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
#1222
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?
#1223
Answer: B✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is the BEST method for assessing the current effectiveness of an organization’s risk management program against its desired level of capability?
#1224
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC An organization has decided to migrate its critical system database containing customer information to branches located in other countries. Which of the following should be of MOST concern regarding the migration?
#1225
Answer: A✅ Correct❌ Incorrect
Isaca's CRISC Where should a risk practitioner document the current state and desired future state of organizational risk?
#1226
Answer: D✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would BEST prevent an unscheduled application of a patch?
#1227
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following is MOST likely to trigger the need for a risk reassessment?
#1228
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:
#1229
Answer: C✅ Correct❌ Incorrect
Isaca's CRISC Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?