Free Certification Practice Questions

ISACA-CRISC

Loading…
Which of the following roles should be assigned accountability for monitoring risk levels?
#1051
A MAJOR advantage of using key risk indicators (KRIs) is that they:
#1052
Which of the following is a risk practitioner’s BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
#1053
An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner’s recommendation?
#1054
Who is the BEST person to authorize access privileges to database tables for an application system used to process employee personal data?
#1055
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan?
#1056
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
#1057
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
#1058
Which of the following is performed after a risk assessment is completed?
#1059
A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?
#1060
Which of the following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?
#1061
Which of the following would provide the BEST evidence of an effective internal control environment?
#1062
Which of the following has the GREATEST influence on an organization’s risk appetite?
#1063
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?
#1064
Which of the following is the PRIMARY objective of establishing an organization’s risk tolerance and appetite?
#1065
Which of the following is the MOST effective way to identify an application backdoor prior to implementation?
#1066
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
#1067
After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?
#1068
Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?
#1069
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
#1070
Which of the following is the PRIMARY objective of maintaining an information asset inventory?
#1071
Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?
#1072
Which of the following is MOST likely to deter an employee from engaging in inappropriate use of company-owned IT systems?
#1073
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
#1074
The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
#1075
Which of the following is the BEST approach for selecting controls to minimize risk?
#1076
Which of the following provides the MOST reliable evidence of a control’s effectiveness?
#1077
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
#1078
An organization has experienced a cyber attack that exposed customer personally identifiable information (PII) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
#1079
Who is MOST important to include in the assessment of existing IT risk scenarios?
#1080