Free Certification Practice Questions

ISACA-CRISC

Loading…
Isaca's CRISC An organization's risk profile indicates that residual risk levels have fallen significantly below management's risk appetite. Which of the following is the BEST course of action?
#1381
Isaca's CRISC A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?
#1382
Isaca's CRISC In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (AI) solutions?
#1383
Isaca's CRISC Which of the following BEST enables an organization to mitigate ethical risk?
#1384
Isaca's CRISC A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
#1385
Isaca's CRISC Which of the following is MOST important for developing effective key risk indicators (KRIs)?
#1386
Isaca's CRISC Which of the following is BEST to use as a basis for developing a comprehensive list of IT risk scenarios?
#1387
Isaca's CRISC Which of the following practices MOST effectively safeguards the processing of personal data?
#1388
Isaca's CRISC An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
#1389
Isaca's CRISC Which of the following should be the PRIMARY consideration when assessing tools for automated control monitoring?
#1390
Isaca's CRISC When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?
#1391
Isaca's CRISC Which of the following BEST demonstrates that an implemented control is effective in mitigating the intended risk?
#1392
Isaca's CRISC An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?
#1393
Isaca's CRISC Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?
#1394
Isaca's CRISC Which of me following groups would provide the MOST relevant perspective when reporting loss exposure based on a risk analysis exercise?
#1395
Isaca's CRISC When a risk practitioner is developing a set of risk scenarios, the scenarios MUST include information about:
#1396
Isaca's CRISC A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization’s risk appetite. Which of the following would be the MOST effective course of action?
#1397
Isaca's CRISC Which of the following is the PRIMARY reason to obtain independent reviews of risk assessment and response mechanisms?
#1398
Isaca's CRISC Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?
#1399
Isaca's CRISC A data privacy regulation has been revised to incorporate more stringent requirements on personal data protection. Which of the following will provide the MOST important input to help ensure compliance with the revised regulation?
#1400
Isaca's CRISC Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?
#1401
Isaca's CRISC Who should be responsible for approving the cost of controls to be :mplemented for mitigating risk?
#1402
Isaca's CRISC Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
#1403
Isaca's CRISC Which of the following would MOST likely cause senior management to lower the risk tolerance level?
#1404
Isaca's CRISC A Software as a Service (SaaS) company wants to use aggregated data from its clients to improve its services via a machine learning model. However, its contracts do not clearly allow this use of aggregated data. What should the organization do NEXT?
#1405
Isaca's CRISC Who is BEST suited to own an IT risk scenario in an organization where only one IT support person knows how to maintain a core business application?
#1406
Isaca's CRISC Which of the following will be MOST effective in helping to ensure control failures are appropriately managed?
#1407
Isaca's CRISC A risk practitioner has implemented a key risk indicator (KRI) that triggers a warning when the number of untreated IT control deficiencies exceeds a given threshold. Which of the following should be the GREATEST concern regarding the design of this KRI?
#1408
Isaca's CRISC Which of the following would be MOST effective in promoting a risk-aware culture within an organization?
#1409
Isaca's CRISC An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner's NEXT course of action?
#1410