Isaca CRISC - Certified in Risk and Information Systems Control
Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Which of the following would BEST enable a risk practitioner to embed risk management within the organization?
When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?
Which of the following tasks should be completed prior to creating a disaster recovery plan (DRP)?
An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
Which of the following approaches MOST effectively enables accountability for data protection?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
Which of the following is the PRIMARY benefit of using a risk map with stakeholders?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following is the MOST important responsibility of a risk owner?
A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
Which of the following trends would cause the GREATEST concern regarding the effectiveness of an organization's user access control processes? An increase in the:
A business manager wants to leverage an existing approved vendor solution from another area within the organization. Which of the following is the risk practitioner's BEST course of action?
Which of the following would BEST help to ensure that identified risk is efficiently managed?
To help identify high-risk situations, an organization should:
An organization mandates the escalation of a service ticket when a key application is offline for 5 minutes or more due to potential risk exposure. The risk practitioner has been asked by management to prepare a report of application offline times using both 3- and 5-minute thresholds. What does the 3-minute threshold represent?
Key risk indicators (KRIs) BEST support risk treatment when they:
Which of the following is the PRIMARY purpose of a risk register?
Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
Which of the following is MOST effective in continuous risk management process improvement?
The MAIN purpose of reviewing a control after implementation is to validate that the control:
An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner's BEST course of action?
Which of the following is MOST useful when performing a quantitative risk assessment?
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls. Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:
An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
Which of the following contributes MOST to the effective implementation of risk responses?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following BEST indicates the effective implementation of a risk treatment plan?
Which of the following roles should be assigned accountability for monitoring risk levels?
When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:
When assigning control ownership, it is MOST important to verify that the owner has accountability for:
The BEST way to test the operational effectiveness of a data backup procedure is to:
Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:
All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:
Which of the following provides the MOST useful information when determining if a specific control should be implemented?
What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?