Isaca CRISC - Certified in Risk and Information Systems Control
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following statements in an organization's current risk profile report is cause for further action by senior management?
An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
Which of the following is the MOST important factor affecting risk management in an organization?
When evaluating a number of potential controls for treating risk, it is MOST important to consider:
Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?
Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?
The FIRST task when developing a business continuity plan should be to:
Which of the following would BEST prevent an unscheduled application of a patch?
When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
A risk practitioner has reviewed new international regulations and realizes the new regulations will affect the organization. Which of the following should be the risk practitioner's NEXT course of
action?
Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner's GREATEST concern?
Which of the following is the BEST risk management approach for the strategic IT planning process?
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?
Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?
Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Which of the following would qualify as a key performance indicator (KPI)?
Which of the following is the MOST important update for keeping the risk register current?
Which of The following BEST represents the desired risk posture for an organization?
Of the following, who should be responsible for determining the inherent risk rating of an application?
Which of the following is MOST important for senior management to review during an acquisition?
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
An IT risk threat analysis is BEST used to establish
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Which of the following is the MOST important reason to create risk scenarios?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
Well-developed, data-driven risk measurements should be:
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?
Which of the following is MOST critical to the design of relevant risk scenarios?
Which of the following activities should only be performed by the third line of defense?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?