Isaca CRISC - Certified in Risk and Information Systems Control
An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Which of the following should be the PRIMARY input to determine risk tolerance?
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
Which organizational role should be accountable for ensuring information assets are appropriately classified?
For a large software development project, risk assessments are MOST effective when performed:
Which of the following is the BEST way to determine software license compliance?
Which of the following is a responsibility of the second line of defense in the three lines of defense model?
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?
The PRIMARY objective for selecting risk response options is to:
Which of the following BEST reduces the likelihood of employees unintentionally disclosing sensitive information to outside parties?
Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?
A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?
Which of the following BEST enables an organization to address risk associated with technical complexity?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
When establishing an enterprise IT risk management program, it is MOST important to:
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Which of the following is the PRIMARY responsibility of a control owner?
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
Which risk response strategy could management apply to both positive and negative risk that has been identified?
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following events is MOST likely to trigger the need to conduct a risk assessment?
Which of the following BEST mitigates ethical risk?
Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?
Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?
Mapping open risk issues to an enterprise risk heat map BEST facilitates:
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
In the three lines of defense model, a PRIMARY objective of the second line is to:
Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?
Which of the following is the MOST useful input when developing risk scenarios?
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
An organization is measuring the effectiveness of its change management program to reduce the number of unplanned production changes. Which of the following would be the BEST metric to determine if the program is performing as expected?
An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?
Which of the following would BEST indicate to senior management that IT processes are improving?
Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization's current risk profile?
Which of the following methods would BEST contribute to identifying obscure risk scenarios?
For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on theorganization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?
Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?
Which of the following can be affected by the cost of risk mitigation alternatives?
What is a risk practitioner's BEST approach to monitor and measure how quickly an exposure to a specific risk can affect the organization?
From a risk management perspective, the PRIMARY objective of using maturity models is to enable: