Free Certification Practice Questions

ISACA-CRISC

Loading…
Controls should be defined during the design phase of system development because:
#601
Which of the following will BEST support management reporting on risk?
#602
Which of the following provides the BEST evidence that a selected risk treatment plan is effective?
#603
Which of the following conditions presents the GREATEST risk to an application?
#604
To reduce costs, an organization is combining the second and third lines of defense in a new department that reports to a recently appointed C-level executive.Which of the following is the GREATEST concern with this situation?
#605
Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?
#606
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
#607
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
#608
Which of the following BEST indicates the efficiency of a process for granting access privileges?
#609
Which of the following BEST indicates the effectiveness of anti-malware software?
#610
When establishing an enterprise IT risk management program, it is MOST important to:
#611
Which of the following is the BEST way to determine software license compliance?
#612
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?
#613
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
#614
Which of the following provides the MOST important information to facilitate a risk response decision?
#615
Which of the following BEST contributes to the implementation of an effective risk response action plan?
#616
Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?
#617
Which of the following is the MOST important reason to test new controls?
#618
A new international data privacy regulation requires personal data to be disposed after the specified retention period, which is different from the local regulatory requirement. Which of the following is the risk practitioner's BEST recommendation to resolve the disparity?
#619
Which of the following should be the MAIN consideration when validating an organization's risk appetite?
#620
Which of the following would MOST likely result in updates to an IT risk profile?
#621
A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider. Who should the risk scenario be reassigned to?
#622
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
#623
Which of the following is MOST important for an organization that wants to reduce IT operational risk?
#624
The MAIN goal of the risk analysis process is to determine the:
#625
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
#626
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
#627
Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?
#628
The PRIMARY purpose of a maturity model is to compare the:
#629
Which of the following is the MAIN reason for analyzing risk scenarios?
#630