Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Isaca CRISC - Certified in Risk and Information Systems Control

Page: 6 / 11
Total 1641 questions

Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?

A.

Obtaining funding support

B.

Defining the risk assessment scope

C.

Selecting the risk assessment framework

D.

Establishing inherent risk

During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:

A.

reset the alert threshold based on peak traffic

B.

analyze the traffic to minimize the false negatives

C.

analyze the alerts to minimize the false positives

D.

sniff the traffic using a network analyzer

Which of the following scenarios represents a threat?

A.

Connecting a laptop to a free, open, wireless access point (hotspot)

B.

Visitors not signing in as per policy

C.

Storing corporate data in unencrypted form on a laptop

D.

A virus transmitted on a USB thumb drive

Which of the following would be MOST useful when measuring the progress of a risk response action plan?

A.

Percentage of mitigated risk scenarios

B.

Annual loss expectancy (ALE) changes

C.

Resource expenditure against budget

D.

An up-to-date risk register

Which of the following is the MOST significant risk related to an organization's use of AI technology?

A.

The AI system's contract does not include a right-to-audit clause

B.

The AI system is being used beyond its intended purpose

C.

The AI system is on unsupported infrastructure

D.

The AI system results have not been validated

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

A.

Periodic user privileges review

B.

Log monitoring

C.

Periodic internal audits

D.

Segregation of duties

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

A.

Approval by senior management

B.

Low cost of development and maintenance

C.

Sensitivity to changes in risk levels

D.

Use of industry risk data sources

Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?

A.

Unencrypted data

B.

Lack of redundant circuits

C.

Low bandwidth connections

D.

Data integrity

Which of the following would MOST likely cause management to unknowingly accept excessive risk?

A.

Satisfactory audit results

B.

Risk tolerance being set too low

C.

Inaccurate risk ratings

D.

Lack of preventive controls

Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?

A.

The impact of controls on the efficiency of the business in delivering services

B.

Linkage of identified risk scenarios with enterprise risk management

C.

Potential threats and vulnerabilities that may have an impact on the business

D.

Results of network vulnerability scanning and penetration testing

Management has determined that it will take significant time to remediate exposures in the current IT control environment. Which of the following is the BEST course of action?

A.

Implement control monitoring.

B.

Improve project management methodology.

C.

Reassess the risk periodically.

D.

Identify compensating controls.

It is MOST important that security controls for a new system be documented in:

A.

testing requirements

B.

the implementation plan.

C.

System requirements

D.

The security policy

In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?

A.

Implementation

B.

Development

C.

Design

D.

Feasibility

A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:

A.

management.

B.

tolerance.

C.

culture.

D.

analysis.

Which of the following is the BEST method to identify unnecessary controls?

A.

Evaluating the impact of removing existing controls

B.

Evaluating existing controls against audit requirements

C.

Reviewing system functionalities associated with business processes

D.

Monitoring existing key risk indicators (KRIs)

An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?

A.

Inherent risk

B.

Risk appetite

C.

Risk tolerance

D.

Residual risk

Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?

A.

Cloud service provider

B.

IT department

C.

Senior management

D.

Business unit owner

Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?

A.

Control owner

B.

Risk owner

C.

Internal auditor

D.

Compliance manager

The MOST important objective of information security controls is to:

A.

Identify threats and vulnerability

B.

Ensure alignment with industry standards

C.

Provide measurable risk reduction

D.

Enforce strong security solutions

When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?

A.

Mapping threats to organizational objectives

B.

Reviewing past audits

C.

Analyzing key risk indicators (KRIs)

D.

Identifying potential sources of risk

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

A.

Evaluate current risk management alignment with relevant regulations

B.

Determine if business continuity procedures are reviewed and updated on a regular basis

C.

Conduct a benchmarking exercise against industry peers

D.

Review the methodology used to conduct the business impact analysis (BIA)

Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?

A.

Cost versus benefit of additional mitigating controls

B.

Annualized loss expectancy (ALE) for the system

C.

Frequency of business impact

D.

Cost of the Information control system

Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?

A.

Impact analysis

B.

Control analysis

C.

Root cause analysis

D.

Threat analysis

Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?

A.

Variances between organizational risk appetites

B.

Different taxonomies to categorize risk scenarios

C.

Disparate platforms for governance, risk, and compliance (GRC) systems

D.

Dissimilar organizational risk acceptance protocols

Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?

A.

Transferring the risk

B.

Introducing control procedures early in the life cycle

C.

Updating the risk tolerance to include the new risk

D.

Implementing IoT device monitoring software

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

A.

Segregation of duties

B.

Three lines of defense

C.

Compliance review

D.

Quality assurance review

The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:

A.

highlight trends of developing risk.

B.

ensure accurate and reliable monitoring.

C.

take appropriate actions in a timely manner.

D.

set different triggers for each stakeholder.

An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?

A.

Redesign the heat map.

B.

Review the risk tolerance.

C.

Perform a business impact analysis (BIA)

D.

Update the risk register.

Which of the following provides the MOST important information to facilitate a risk response decision?

A.

Audit findings

B.

Risk appetite

C.

Key risk indicators

D.

Industry best practices

An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?

A.

Report the observation to the chief risk officer (CRO).

B.

Validate the adequacy of the implemented risk mitigation measures.

C.

Update the risk register with the implemented risk mitigation actions.

D.

Revert the implemented mitigation measures until approval is obtained

What are the MOST essential attributes of an effective Key control indicator (KCI)?

A.

Flexibility and adaptability

B.

Measurability and consistency

C.

Robustness and resilience

D.

Optimal cost and benefit

When developing a response plan to address security incidents regarding sensitive data loss, it is MOST important

A.

revalidate current key risk indicators (KRIs).

B.

revise risk management procedures.

C.

review the data classification policy.

D.

revalidate existing risk scenarios.

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.

Implement segregation of duties.

B.

Enforce an internal data access policy.

C.

Enforce the use of digital signatures.

D.

Apply single sign-on for access control.

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:

A.

data classification and labeling.

B.

data logging and monitoring.

C.

data retention and destruction.

D.

data mining and analytics.

Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?

A.

Changes in control design

B.

A decrease in the number of key controls

C.

Changes in control ownership

D.

An increase in residual risk

Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?

A.

Identifying users who have access

B.

Selecting an encryption solution

C.

Defining the data retention period

D.

Determining the value of data

Which of the following will BEST quantify the risk associated with malicious users in an organization?

A.

Business impact analysis

B.

Risk analysis

C.

Threat risk assessment

D.

Vulnerability assessment

To help ensure the success of a major IT project, it is MOST important to:

A.

obtain the appropriate stakeholders' commitment.

B.

align the project with the IT risk framework.

C.

obtain approval from business process owners.

D.

update the risk register on a regular basis.

Which of the following would prompt changes in key risk indicator {KRI) thresholds?

A.

Changes to the risk register

B.

Changes in risk appetite or tolerance

C.

Modification to risk categories

D.

Knowledge of new and emerging threats

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?

A.

Control matrix documentation

B.

Vendor security reports

C.

Service Level Agreement (SLA)

D.

An independent third-party audit

In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?

A.

Board of directors

B.

Risk officers

C.

Line management

D.

Senior management

Which of the following BEST facilitates the development of effective IT risk scenarios?

A.

Utilization of a cross-functional team

B.

Participation by IT subject matter experts

C.

Integration of contingency planning

D.

Validation by senior management

A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?

A.

Add a digital certificate

B.

Apply multi-factor authentication

C.

Add a hash to the message

D.

Add a secret key

Which of the following is MOST important to include in a risk assessment of an emerging technology?

A.

Risk response plans

B.

Risk and control ownership

C.

Key controls

D.

Impact and likelihood ratings

Who should be responsible for strategic decisions on risk management?

A.

Chief information officer (CIO)

B.

Executive management team

C.

Audit committee

D.

Business process owner

Which of the following is MOST useful when communicating risk to management?

A.

Risk policy

B.

Audit report

C.

Risk map

D.

Maturity model

Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?

A.

Data security

B.

Recovery costs

C.

Business disruption

D.

Recovery resource availability

Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?

A.

Automated controls

B.

Security awareness training

C.

Multifactor authentication

D.

Employee sanctions

An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?

A.

Move redundant IT infrastructure to a closer location.

B.

Obtain insurance and ensure sufficient funds are available for disaster recovery.

C.

Review the business continuity plan (BCP) and align it with the new business needs.

D.

Outsource disaster recovery services to a third-party IT service provider.