Correct
Are specific security controls mandated in the outsourcing contract/agreement An
enterprise has outsourced several business functions to a firm in another country, including IT
development, data hosting, and support. What is the most important question a risk professional
will ask in relation to the outsourcing arrangements?
A new risk detection Which of the following is most essential for a risk management
program to be effective?
Senior Management Who must give final sign off on the IT Risk management plan?
a level that the enterprise is willing to accept. Risk management are designed to reduce
risk to:
Probability and Consequence Which of the following combinations of factors helps
quantify risk?
improper oversight of IT investments The greatest risk posed by an absence of strategic
planning is:
, CRISC IS Questions With Answers 100%
Correct
Lack of skilled resources Which of the following examples fo risk should be addressed
during application design?
Backdoors Which of the following is of most concern for the risk practitioner regarding
applications running in production?
management control An enterprise security policy is an example of which control?
It drives the risk response plan Which of the following statements best describes the value
of a risk register?
Users of IT services Who is accountable for business risk related to IT?
A community cloud deployment model Which of the following cloud computing models
is most appropriate for a collaborative research between universities?
, CRISC IS Questions With Answers 100%
Correct
Corporate email system Senior management will most likely have the highest tolerance
for moving which of the following to public cloud?
The installations of many insecure devices on the internet The most important external
factors that should be considered in a risk assessment are?
Board of Directors Who is accountable for the overall enterprise strategy for risk
governance?
An actor Which of the following most affects a risk scenario?
Failure et subject applications to testing and general IT controls Which of the following is
the most prevalent risk in the development of end-user computing applications?
A compliance oriented BIA What is the most effective technique to evaluate the potential
impact of legal, regulatory, and contractual requirements on business objectives?