Isaca CRISC - Certified in Risk and Information Systems Control
Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?
A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?
A technology company is developing a strategic artificial intelligence (Al)-driven application that has high potential business value. At what point should the enterprise risk profile be updated?
Which of the following would BEST help an enterprise define and communicate its risk appetite?
An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
The PRIMARY purpose of vulnerability assessments is to:
The MAIN purpose of selecting a risk response is to.
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?
A public online information security training course is available to an organization's staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization's risk practitioner?
A risk practitioner notices that a particular key risk indicator (KRI) has remained below its established trigger point for an extended period of time. Which of the following should be done FIRST?
Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
A PRIMARY advantage of involving business management in evaluating and managing risk is that management:
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?
Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?
Which of the following is the GREATEST impact of implementing a risk mitigation strategy?
The purpose of requiring source code escrow in a contractual agreement is to:
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?
Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
When of the following provides the MOST tenable evidence that a business process control is effective?
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?
Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
Which of the following is the MOST important information to be communicated during security awareness training?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
The BEST reason to classify IT assets during a risk assessment is to determine the:
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?
Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:
An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Establishing and organizational code of conduct is an example of which type of control?
A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?
Which of the following is the MOST important reason to communicate control effectiveness to senior management?
Which of the following is the MOST cost-effective way to test a business continuity plan?
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to: