Isaca CRISC - Certified in Risk and Information Systems Control
The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
A compensating control is MOST appropriate when:
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following is the MOST effective way to help ensure accountability for managing risk?
A maturity model is MOST useful to an organization when it:
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?
Which of the following BEST enables the identification of trends in risk levels?
Which of the following is the MOST important consideration when selecting digital signature software?
Which of the following provides the BEST assurance of the effectiveness of vendor security controls?
The risk associated with an asset after controls are applied can be expressed as:
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?
Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?
Which of the following will BEST ensure that controls adequately support business goals and objectives?
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?
Recent penetration testing of an organization's software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?
Which of the following should be management's PRIMARY consideration when approving risk response action plans?
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?
Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?
Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?
A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?
An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
A risk register BEST facilitates which of the following risk management functions?
Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?
Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?
The GREATEST concern when maintaining a risk register is that:
An IT project risk was identified during a monthly steering committee meeting. Which of the following roles is BEST positioned to approve the risk mitigation response?
Which of the following should be determined FIRST when a new security vulnerability is made public?
Which of the following BEST indicates the efficiency of a process for granting access privileges?
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?
When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:
A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?
In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
Which of the following describes the relationship between risk appetite and risk tolerance?
Which of the following is the PRIMARY objective of a risk awareness program?