Free Certification Practice Questions

ISACA-CRISC

Loading…
Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?
#901
An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management's decision?
#902
Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?
#903
Which of the following should be the PRIMARY basis for prioritizing two risk scenarios related to network service disruption that have the same impact?
#904
In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
#905
Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
#906
Which of the following should be the PRIMARY basis for the development of an IT risk scenario?
#907
An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?
#908
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
#909
Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
#910
A vendor manager reports that a previously compliant service provider had issues with its most recent security audit. Which of the following is the MOST important course of action?
#911
Which of the following is a corrective control?
#912
Which of the following elements of a risk register is MOST useful to share with key stakeholders to influence informed decision-making?
#913
Which of the following elements is MOST essential when creating risk scenarios?
#914
When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:
#915
What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?
#916
Which of the following is MOST likely to be identified from an information systems audit report?
#917
Which of the following would MOST effectively mitigate the risk of data loss when production data is being used in a testing environment?
#918
Which of the following MOST effectively enables senior management to communicate risk appetite?
#919
Which activity would BEST enable a risk manager to verify the scope of responsibilities for stakeholders in IT risk scenarios?
#920
Which of the following provides the MOST useful input when developing IT risk scenarios?
#921
What is the PRIMARY purpose of reporting residual risk from two consecutive IT risk assessments to management?
#922
Which of the following should be of MOST concern to a risk practitioner reviewing a recent audit report of an organization's data center?
#923
Which of the following is the BEST way to mitigate the risk of inappropriate access to personally identifiable information (PII) by third-party cloud service personnel?
#924
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis. Which of the following is theMOST important control to ensure the privacy of customer information?
#925
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
#926
An information security manager has advocated for the purchase of a data loss prevention (DLP) system to reduce the impact of a potential data breach. Which of the following is the BEST way for the risk practitioner to support this recommendation?
#927
As part of its vendor management program, an organization has commissioned an audit of a vendor's control framework for the purpose of implementing compensating controls into its environment. Which risk response option has been decided?
#928
Which of the following would be MOST helpful to management when reviewing enterprise risk appetite and tolerance?
#929
Which of the following are the MOST important inputs when determining the desired state of IT risk during gap analysis?
#930