Isaca CRISC - Certified in Risk and Information Systems Control
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
A risk practitioner is collaborating with key stakeholders to prioritize a large number of IT risk scenarios. Which scenarios should receive the PRIMARY focus?
The BEST key performance indicator (KPI) to measure the effectiveness of the security patching process is the percentage of patches installed:
Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?
Which of the following BEST helps to ensure disaster recovery staff members
are able to complete their assigned tasks effectively during a disaster?
Which of the following is MOST important for an organization to consider when developing its IT strategy?
Which of the following BEST enables effective risk reporting to the board of directors?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
Which of the following is the PRIMARY reason for a risk practitioner to examine a post-implementation review report for a control automation tool?
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?
Which of the following is the BEST method for identifying vulnerabilities?
An organization has raised the risk appetite for technology risk. The MOST likely result would be:
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?
A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?
A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?
A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?
An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?
Which of the following is the BEST indication of an effective risk management program?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
An organization's IT infrastructure is running end-of-life software that is not allowed without exception approval. Which of the following would provide the MOST helpful information to justify investing in updated software?
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Which of the following BEST indicates the efficiency of a process for granting access privileges?
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?
To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:
Which of the following is the MOST important input when developing risk scenarios?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?
An organization has adopted an emerging technology without following proper processes. Which of the following is the risk practitioner's BEST course of action to address this risk?
Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?
Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
Which of the following is the BEST method to maintain a common view of IT risk within an organization?
A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?
Which of the following is the PRIMARY purpose of creating and documenting control procedures?