Isaca CRISC - Certified in Risk and Information Systems Control
Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
Which of the following is MOST important to sustainable development of secure IT services?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
Which of the following provides the BEST measurement of an organization's risk management maturity level?
Risk mitigation is MOST effective when which of the following is optimized?
Which of the following is the MOST important characteristic when designing a key risk indicator (KRI)?
Which of the following would be MOST effective in monitoring changes in an organization's IT risk environment?
Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?
Which of the following is a KEY outcome of risk ownership?
Which of the following would BEST support the integrity of online financial transactions?
Which of the following would be a risk practitioner’s GREATEST concern related to the monitoring of key risk indicators (KRIs)?
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
Which of the following is the MOST important document regarding the treatment of sensitive data?
Which of the following is MOST important to compare against the corporate risk profile?
During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:
Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?
A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:
Which of the following is the BEST approach for obtaining management buy-in
to implement additional IT controls?
The maturity of an IT risk management program is MOST influenced by:
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
An effective control environment is BEST indicated by controls that:
A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?
A violation of segregation of duties is when the same:
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:
Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?
Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?
An organization's business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner's PRIMARY consideration when participating in development of the new strategy?
The PRIMARY benefit associated with key risk indicators (KRls) is that they:
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?
Which of the following BEST assists in justifying an investment in automated controls?
Which of the following would provide the MOST comprehensive information for updating an organization's risk register?
An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?
Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
An organization wants to assess the maturity of its internal control environment. The FIRST step should be to:
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?
Which of the following observations from a third-party service provider review would be of GREATEST concern to a risk practitioner?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following BEST supports an accurate asset inventory system?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?