Isaca CRISC - Certified in Risk and Information Systems Control
A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
Which of the following is a specific concern related to machine learning algorithms?
Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?
Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?
Which of the following will MOST likely change as a result of the decrease in risk appetite due to a new privacy regulation?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
Which of the following BEST ensures that the data feeds used by an organization are complete and accurate?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?
Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?
Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Who is ULTIMATELY accountable for risk treatment?
Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?
An organization's risk tolerance should be defined and approved by which of the following?
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?
Which of the following is the BEST way to validate the results of a vulnerability assessment?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?
Which of the following BEST protects organizational data within a production cloud environment?
Which of the following should be done FIRST when a new risk scenario has been identified
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
Which of the following is the GREATEST benefit of centralizing IT systems?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?
Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?
Who is the BEST person to an application system used to process employee personal data?
Performing a background check on a new employee candidate before hiring is an example of what type of control?
Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk
awareness program?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
Which of the following BEST enables an organization to increase the likelihood of identifying risk associated with unethical employee behavior?
Which of the following is the BEST course of action to reduce risk impact?
What is the BEST information to present to business control owners when justifying costs related to controls?
Which of the following is the GREATEST benefit of identifying appropriate risk owners?
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?
An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?
Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?
Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization's risk profile?
Which of the following should be reported periodically to the risk committee?
Which of the following is the MOST important reason to communicate risk assessments to senior management?
Who is accountable for risk treatment?