Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Isaca CRISC - Certified in Risk and Information Systems Control

Page: 9 / 11
Total 1641 questions

A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?

A.

Training and awareness of employees for increased vigilance

B.

Increased monitoring of executive accounts

C.

Subscription to data breach monitoring sites

D.

Suspension and takedown of malicious domains or accounts

Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?

A.

To define effective enterprise IT risk appetite and tolerance levels

B.

To execute the IT risk management strategy in support of business objectives

C.

To establish business-aligned IT risk management organizational structures

D.

To assess the capabilities and maturity of the organization’s IT risk management efforts

Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?

A.

An annual contract review

B.

A service level agreement (SLA)

C.

A requirement to adopt an established risk management framework

D.

A requirement to provide an independent audit report

In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?

A.

A standardized risk taxonomy

B.

A list of control deficiencies

C.

An enterprise risk ownership policy

D.

An updated risk tolerance metric

Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?

A.

Internal auditor

B.

Asset owner

C.

Finance manager

D.

Control owner

Which of the following is a specific concern related to machine learning algorithms?

A.

Low software quality

B.

Lack of access controls

C.

Data breaches

D.

Data bias

Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?

A.

The policy lacks specifics on how to secure the organization's systems from cyberattacks.

B.

The policy has gaps against relevant cybersecurity standards and frameworks.

C.

The policy has not been reviewed by the cybersecurity team in over a year.

D.

The policy has not been approved by the organization's board.

Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?

A.

Risk appetite

B.

Control cost

C.

Control effectiveness

D.

Risk tolerance

Which of the following will MOST likely change as a result of the decrease in risk appetite due to a new privacy regulation?

A.

Key risk indicator (KRI) thresholds

B.

Risk trends

C.

Key performance indicators (KPIs)

D.

Risk objectives

A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:

A.

map findings to objectives.

B.

provide quantified detailed analysis

C.

recommend risk tolerance thresholds.

D.

quantify key risk indicators (KRls).

Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?

A.

Manual vulnerability scanning processes

B.

Organizational reliance on third-party service providers

C.

Inaccurate documentation of enterprise architecture (EA)

D.

Risk-averse organizational risk appetite

An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?

A.

Meet with the business leaders to ensure the classification of their transferred data is in place

B.

Ensure the language in the contract explicitly states who is accountable for each step of the data transfer process

C.

Collect requirements for the environment to ensure the infrastructure as a service (IaaS) is configured appropriately.

D.

Work closely with the information security officer to ensure the company has the proper security controls in place.

Which of the following BEST ensures that the data feeds used by an organization are complete and accurate?

A.

Data is inspected and accepted by owners

B.

Best-in-class data mining technology is used

C.

Sources of data and attributes are known

D.

The project is run by an experienced team

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

A.

Limited blockchain adoption and support

B.

Reduced transaction speed and system responsiveness

C.

Reduced network integrity and availability

D.

Limited integration with external systems and blockchains

An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?

A.

Sections of the policy that may justify not implementing the requirement

B.

Risk associated with the inability to implement the requirement

C.

Budget justification to implement the new requirement during the current year

D.

Industry best practices with respect to implementation of the proposed control

Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?

A.

Activate the incident response plan.

B.

Implement compensating controls.

C.

Update the risk register.

D.

Develop risk scenarios.

Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?

A.

Adherence to legal and compliance requirements

B.

Reduction in the number of test cases in the acceptance phase

C.

Establishment of digital forensic architectures

D.

Consistent management of information assets

An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?

A.

Due diligence for the recommended cloud vendor has not been performed.

B.

The business can introduce new Software as a Service (SaaS) solutions without IT approval.

C.

The maintenance of IT infrastructure has been outsourced to an Infrastructure as a Service (laaS) provider.

D.

Architecture responsibilities may not be clearly defined.

Who is ULTIMATELY accountable for risk treatment?

A.

Risk owner

B.

Enterprise risk management (ERM)

C.

Risk practitioner

D.

Control owner

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

An organization's risk tolerance should be defined and approved by which of the following?

A.

The chief risk officer (CRO)

B.

The board of directors

C.

The chief executive officer (CEO)

D.

The chief information officer (CIO)

Which of the following is the BEST course of action to help reduce the probability of an incident recurring?

A.

Perform a risk assessment.

B.

Perform root cause analysis.

C.

Initiate disciplinary action.

D.

Update the incident response plan.

When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:

A.

that results in a full root cause analysis.

B.

used for verification within the SLA.

C.

that are verified as actual incidents.

D.

resolved within the SLA.

Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?

A.

Number of service level agreement (SLA) violations

B.

Percentage of recovery issues identified during the exercise

C.

Number of total systems recovered within tie recovery point objective (RPO)

D.

Percentage of critical systems recovered within tie recovery time objective (RTO)

Which of the following is the BEST way to validate the results of a vulnerability assessment?

A.

Perform a penetration test.

B.

Review security logs.

C.

Conduct a threat analysis.

D.

Perform a root cause analysis.

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?

A.

Percentage of job failures identified and resolved during the recovery process

B.

Percentage of processes recovered within the recovery time and point objectives

C.

Number of current test plans and procedures

D.

Number of issues and action items resolved during the recovery test

Which of the following BEST protects organizational data within a production cloud environment?

A.

Data encryption

B.

Continuous log monitoring

C.

Right to audit

D.

Data obfuscation

Which of the following should be done FIRST when a new risk scenario has been identified

A.

Estimate the residual risk.

B.

Establish key risk indicators (KRIs).

C.

Design control improvements.

D.

Identify the risk owner.

The PRIMARY advantage of involving end users in continuity planning is that they:

A.

have a better understanding of specific business needs

B.

can balance the overall technical and business concerns

C.

can see the overall impact to the business

D.

are more objective than information security management.

Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?

A.

Configuration updates do not follow formal change control.

B.

Operational staff perform control self-assessments.

C.

Controls are selected without a formal cost-benefit

D.

analysis-Management reviews security policies once every two years.

Which of the following is the GREATEST benefit of centralizing IT systems?

A.

Risk reporting

B.

Risk classification

C.

Risk monitoring

D.

Risk identification

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?

A.

Data storage and collection methods

B.

Data owner preferences

C.

Legal and regulatory requirements

D.

Choice of encryption algorithms

Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?

A.

Several risk action plans have missed target completion dates.

B.

Senior management has accepted more risk than usual.

C.

Risk associated with many assets is only expressed in qualitative terms.

D.

Many risk scenarios are owned by the same senior manager.

Who is the BEST person to an application system used to process employee personal data?

A.

Compliance manager

B.

Data privacy manager

C.

System administrator

D.

Human resources (HR) manager

Performing a background check on a new employee candidate before hiring is an example of what type of control?

A.

Detective

B.

Compensating

C.

Corrective

D.

Preventive

Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk

awareness program?

A.

Policies and procedures

B.

Structure and culture

C.

Key risk indicators (KRIs) and thresholds

D.

Known threats and vulnerabilities

Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?

A.

Cyber threat intelligence

B.

Anti-malware software

C.

Endpoint detection and response (EDR)

D.

SIEM systems

Which of the following BEST enables an organization to increase the likelihood of identifying risk associated with unethical employee behavior?

A.

Require a signed agreement by employees to comply with ethics policies

B.

Conduct background checks for new employees

C.

Establish a channel to anonymously report unethical behavior

D.

Implement mandatory ethics training for employees

Which of the following is the BEST course of action to reduce risk impact?

A.

Create an IT security policy.

B.

Implement corrective measures.

C.

Implement detective controls.

D.

Leverage existing technology

What is the BEST information to present to business control owners when justifying costs related to controls?

A.

Loss event frequency and magnitude

B.

The previous year's budget and actuals

C.

Industry benchmarks and standards

D.

Return on IT security-related investments

Which of the following is the GREATEST benefit of identifying appropriate risk owners?

A.

Accountability is established for risk treatment decisions

B.

Stakeholders are consulted about risk treatment options

C.

Risk owners are informed of risk treatment options

D.

Responsibility is established for risk treatment decisions.

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

A.

Replace the action owner with a more experienced individual.

B.

Implement compensating controls until the preferred action can be completed.

C.

Change the risk response strategy of the relevant risk to risk avoidance.

D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.

What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?

A.

Determining possible losses due to downtime during the changes

B.

Updating control procedures and documentation

C.

Approving the proposed changes based on impact analysis

D.

Notifying owners of affected systems after the changes are implemented

An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?

A.

Secure encryption protocols are utilized.

B.

Multi-factor authentication is set up for users.

C.

The solution architecture is approved by IT.

D.

A risk transfer clause is included in the contact

Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

A.

To provide input to the organization's risk appetite

B.

To monitor the vendor's control effectiveness

C.

To verify the vendor's ongoing financial viability

D.

To assess the vendor's risk mitigation plans

Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization's risk profile?

A.

Control identification and mitigation

B.

Adoption of a compliance-based approach

C.

Prevention and detection techniques

D.

Scenario analysis and stress testing

Which of the following should be reported periodically to the risk committee?

A.

System risk and control matrix

B.

Emerging IT risk scenarios

C.

Changes to risk assessment methodology

D.

Audit committee charter

Which of the following is the MOST important reason to communicate risk assessments to senior management?

A.

To ensure actions can be taken to align assessment results to risk appetite

B.

To ensure key risk indicator (KRI) thresholds can be adjusted for tolerance

C.

To ensure awareness of risk and controls is shared with key decision makers

D.

To ensure the maturity of the assessment program can be validated

Who is accountable for risk treatment?

A.

Enterprise risk management team

B.

Risk mitigation manager

C.

Business process owner

D.

Risk owner