Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CRISC - Certified in Risk and Information Systems Control

Page: 5 / 11
Total 1641 questions

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

A.

Key risk indicators (KRls)

B.

Inherent risk

C.

Residual risk

D.

Risk appetite

A compensating control is MOST appropriate when:

A.

Management wants to increase the number of controls.

B.

A vulnerability is identified.

C.

Existing controls are inadequate.

D.

A key control is already in place and operating effectively.

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

Which of the following is the MOST effective way to help ensure accountability for managing risk?

A.

Assign process owners to key risk areas.

B.

Obtain independent risk assessments.

C.

Assign incident response action plan responsibilities.

D.

Create accurate process narratives.

A maturity model is MOST useful to an organization when it:

A.

benchmarks against other organizations

B.

defines a qualitative measure of risk

C.

provides a reference for progress

D.

provides risk metrics.

During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?

A.

Implement continuous monitoring.

B.

Require a second level of approval.

C.

Implement separation of duties.

D.

Require a code of ethics.

Which of the following BEST enables the identification of trends in risk levels?

A.

Correlation between risk levels and key risk indicators (KRIs) is positive.

B.

Measurements for key risk indicators (KRIs) are repeatable

C.

Quantitative measurements are used for key risk indicators (KRIs).

D.

Qualitative definitions for key risk indicators (KRIs) are used.

Which of the following is the MOST important consideration when selecting digital signature software?

A.

Availability

B.

Nonrepudiation

C.

Accuracy

D.

Completeness

Which of the following provides the BEST assurance of the effectiveness of vendor security controls?

A.

Review vendor control self-assessments (CSA).

B.

Review vendor service level agreement (SLA) metrics.

C.

Require independent control assessments.

D.

Obtain vendor references from existing customers.

The risk associated with an asset after controls are applied can be expressed as:

A.

a function of the cost and effectiveness of controls.

B.

the likelihood of a given threat.

C.

a function of the likelihood and impact.

D.

the magnitude of an impact.

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?

A.

Identify the potential risk.

B.

Monitor employee usage.

C.

Assess the potential risk.

D.

Develop risk awareness training.

Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?

A.

To validate the quality of defined deliverables for the program

B.

To detect increases in program costs

C.

To ensure program risk events are mitigated in a timely manner

D.

To provide timely reporting to the governance steering committee

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

A.

Balanced scorecard

B.

Risk appetite

C.

Risk map

D.

Risk events

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?

A.

Better understanding of the risk appetite

B.

Improving audit results

C.

Enabling risk-based decision making

D.

Increasing process control efficiencies

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.

Risk likelihood

B.

Inherent risk

C.

Risk appetite

D.

Risk tolerance

Which of the following will BEST ensure that controls adequately support business goals and objectives?

A.

Using the risk management process

B.

Enforcing strict disciplinary procedures in case of noncompliance

C.

Reviewing results of the annual company external audit

D.

Adopting internationally accepted controls

An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?

A.

Determine whether the impact is outside the risk appetite.

B.

Request a formal acceptance of risk from senior management.

C.

Report the ineffective control for inclusion in the next audit report.

D.

Deploy a compensating control to address the identified deficiencies.

Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?

A.

Threat landscape

B.

Risk appetite

C.

Risk register

D.

Risk metrics

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

A.

Change logs

B.

Change management meeting minutes

C.

Key control indicators (KCIs)

D.

Key risk indicators (KRIs)

Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?

A.

Perform a post-implementation review.

B.

Conduct user acceptance testing.

C.

Review the key performance indicators (KPIs).

D.

Interview process owners.

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

A.

Creating a data classification scheme

B.

Identifying events impacting continuity of operations

C.

Analyzing previous risk assessment results

D.

Identifying critical information assets

Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?

A.

Refer to industry standard scenarios.

B.

Use a top-down approach.

C.

Consider relevant business activities.

D.

Use a bottom-up approach.

Recent penetration testing of an organization's software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?

A.

SIEM software is producing faulty alerts.

B.

Threat modeling was not utilized in the software design process.

C.

The configuration management process is not applied consistently during development.

D.

An identity and access management (IAM) tool has not been properly integrated into the software.

Which of the following should be management's PRIMARY consideration when approving risk response action plans?

A.

Ability of the action plans to address multiple risk scenarios

B.

Ease of implementing the risk treatment solution

C.

Changes in residual risk after implementing the plans

D.

Prioritization for implementing the action plans

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

A.

IT risk practitioner

B.

Third -partf3ecurity team

C.

The relationship owner

D.

Legal representation of the business

An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?

A.

Risk profile

B.

Risk tolerance

C.

Risk capacity

D.

Risk appetite

Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?

A.

Preventive

B.

Deterrent

C.

Compensating

D.

Detective

Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?

A.

Monitoring digital platforms that disseminate inaccurate or misleading news stories

B.

Engaging public relations personnel to debunk false stories and publications

C.

Restricting the use of social media on corporate networks during specific hours

D.

Providing awareness training to understand and manage these types of attacks

A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

A.

Conduct a gap analysis.

B.

Terminate the outsourcing agreement.

C.

Identify compensating controls.

D.

Transfer risk to the third party.

An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?

A.

Risk owner

B.

IT security manager

C.

IT system owner

D.

Control owner

Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Creating metrics to track remote connections

B.

Updating remote desktop software

C.

Implementing multi-factor authentication (MFA)

D.

Updating the organizational policy for remote access

A risk register BEST facilitates which of the following risk management functions?

A.

Analyzing the organization's risk appetite

B.

Influencing the risk culture of the organization

C.

Reviewing relevant risk scenarios with stakeholders

D.

Articulating senior management's intent

Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?

A.

Hosted data

B.

Platforms

C.

Containers

D.

Security logs

Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?

A.

Failed login attempts

B.

Simulating a denial of service attack

C.

Absence of IT audit findings

D.

Penetration test

The GREATEST concern when maintaining a risk register is that:

A.

impacts are recorded in qualitative terms.

B.

executive management does not perform periodic reviews.

C.

IT risk is not linked with IT assets.

D.

significant changes in risk factors are excluded.

An IT project risk was identified during a monthly steering committee meeting. Which of the following roles is BEST positioned to approve the risk mitigation response?

A.

Product owner

B.

IT manager

C.

Project sponsor

D.

Project coordinator

Which of the following should be determined FIRST when a new security vulnerability is made public?

A.

Whether the affected technology is used within the organization

B.

Whether the affected technology is Internet-facing

C.

What mitigating controls are currently in place

D.

How pervasive the vulnerability is within the organization

Which of the following BEST indicates the efficiency of a process for granting access privileges?

A.

Average time to grant access privileges

B.

Number of changes in access granted to users

C.

Average number of access privilege exceptions

D.

Number and type of locked obsolete accounts

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

A.

Organizational reporting process

B.

Incident reporting procedures

C.

Regularly scheduled audits

D.

Incident management policy

Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?

A.

Verifying that project objectives are met

B.

Identifying project cost overruns

C.

Leveraging an independent review team

D.

Reviewing the project initiation risk matrix

Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?

A.

Insurance coverage

B.

Onsite replacement availability

C.

Maintenance procedures

D.

Installation manuals

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?

A.

Postpone the risk assessment.

B.

Facilitate the exception process.

C.

Accept the manager's request.

D.

Reject the manager's request.

When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:

A.

Relevant policies.

B.

Threat landscape.

C.

Awareness program.

D.

Risk heat map.

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?

A.

Impact of risk occurrence

B.

Frequency of risk occurrence

C.

Cost of risk response

D.

Legal aspects of risk realization

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

A.

Percentage of IT assets with current malware definitions

B.

Number of false positives defected over a period of time

C.

Number of alerts generated by the anti-virus software

D.

Frequency of anti-vinjs software updates

In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?

A.

Establishing an intellectual property agreement

B.

Evaluating each of the data sources for vulnerabilities

C.

Periodically reviewing big data strategies

D.

Benchmarking to industry best practice

Which of the following describes the relationship between risk appetite and risk tolerance?

A.

Risk appetite is completely independent of risk tolerance.

B.

Risk tolerance is used to determine risk appetite.

C.

Risk appetite and risk tolerance are synonymous.

D.

Risk tolerance may exceed risk appetite.

Which of the following is the PRIMARY objective of a risk awareness program?

A.

To demonstrate senior management support

B.

To enhance organizational risk culture

C.

To increase awareness of risk mitigation controls

D.

To clearly define ownership of risk