Isaca CRISC - Certified in Risk and Information Systems Control
Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
Which of the following scenarios represents a threat?
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
Which of the following is the MOST significant risk related to an organization's use of AI technology?
A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
Which of the following would MOST likely cause management to unknowingly accept excessive risk?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
Management has determined that it will take significant time to remediate exposures in the current IT control environment. Which of the following is the BEST course of action?
It is MOST important that security controls for a new system be documented in:
In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?
A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:
Which of the following is the BEST method to identify unnecessary controls?
An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
The MOST important objective of information security controls is to:
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?
Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?
Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?
Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?
Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:
An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?
Which of the following provides the MOST important information to facilitate a risk response decision?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
What are the MOST essential attributes of an effective Key control indicator (KCI)?
When developing a response plan to address security incidents regarding sensitive data loss, it is MOST important
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?
Which of the following will BEST quantify the risk associated with malicious users in an organization?
To help ensure the success of a major IT project, it is MOST important to:
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
Which of the following BEST facilitates the development of effective IT risk scenarios?
A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?
Which of the following is MOST important to include in a risk assessment of an emerging technology?
Who should be responsible for strategic decisions on risk management?
Which of the following is MOST useful when communicating risk to management?
Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?
Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?
An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?