Free Certification Practice Questions

ISACA-CRISC

Loading…
Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
#481
After a risk has been identified, who is in the BESTposition to select the appropriate risk treatment option?
#482
Which of the following is the MOST important requirement for monitoring key risk indicators (KRIs) using log analysis?
#483
Who is the MOST appropriate owner for newly identified IT risk?
#484
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
#485
An IT license audit has revealed that there are several unlicensed copies of commercial applications installed on company laptops. The risk practitioner's BEST course of action would be to:
#486
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
#487
Which of the following BEST indicates effective information security incident management?
#488
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
#489
An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
#490
Whose risk tolerance matters MOST when making a risk decision?
#491
Which of the following is the MOST effective way to mitigate identified risk scenarios?
#492
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
#493
Which of the following is the MOST important outcome of reviewing the risk management process?
#494
Which of the following is the MOST important characteristic of an effective risk management program?
#495
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
#496
When prioritizing risk response, management should FIRST:
#497
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
#498
Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?
#499
An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?
#500
A rule-based data loss prevention (DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
#501
An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated to reflect this change?
#502
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
#503
Which of the following is the MOST critical element to maximize the potential for a successful security implementation?
#504
Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system.These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?
#505
Which of the following is the MAIN reason for documenting the performance of controls?
#506
Which of the following is the MOST important element of a successful risk awareness training program?
#507
Whether the results of risk analysis should be presented in quantitative or qualitative terms should be based PRIMARILY on the:
#508
Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?
#509
Which of the following will BEST quantify the risk associated with malicious users in an organization?
#510