Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISACA CRISC ACTUAL EXAM 2024

Beoordeling
-
Verkocht
-
Pagina's
25
Cijfer
A+
Geüpload op
03-01-2024
Geschreven in
2023/2024

Q.No.1 Which of the following is MOST important for an organization that wants to reduce IT operational risk? A. Increasing senior management's understanding of IT operations B. Increasing the frequency of data backups C. Minimizing complexity of IT infrastructure D. Decentralizing IT infrastructure Q.No.2 Deviation from a mitigation action plan's completion date should be determined by which of the following? A. Benchmarking analysis with similar completed projects B. Change management as determined by a change control board C. The risk owner as determined by risk management processes D. Project governance criteria as determined by the project office Q.No.3 A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. What is the BEST course of action? A. Continue the implementation with no changes. B. Obtain management approval for policy exception. C. Select another application with strong password controls. D. Develop an improved password software routine. Q.No.4 Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party? A. Validate the threat management process. B. Obtain objective assessment of the control environment C. Ensure the risk profile is defined and communicated. D. Obtain an objective view of process gaps and systemic errors. Q.No.5 In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data? A. Periodically reviewing big data strategies B. Evaluating each of the data sources for vulnerabilities C. Establishing an intellectual property agreement D. Benchmarking to industry best practice Q.No.6 Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system? A. Implement segregation of duties. B. Enforce an internal data access policy. C. Apply single sign-on for access control. D. Enforce the use of digital signatures. Q.No.7 The GREATEST concern when maintaining a risk register is that: A. significant changes in risk factors are excluded. B. impacts are recorded in qualitative terms. C. executive management does not perform periodic reviews. D. IT risk is not linked with IT assets, Q.No.8 Which of the following will BEST help in communicating strategic risk priorities? A. Heat map B. Business impact analysis (BIA) C. Balanced Scorecard D. Risk register Q.No.9 Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation? A. Stakeholder commitment B. Increased risk appetite C. Reduced risk level D. Increased number of controls Q.No.10 Which of the following is the BEST method for identifying vulnerabilities? A. Batch job failure monitoring B. Periodic network scanning C. Risk assessments D. Annual penetration testing Q.No.11 Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications? A. Design key performance indicators (KPIs) for security in system specifications. B. Include information security control specifications in business cases. C. Identify key risk indicators (KRIs) as process output D. Identify information security controls in the requirements analysis Q.No.12 A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk: A. Tolerance. B. culture. C. Management. D. analysis. Q.No.13 During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner? A. Discuss risk mitigation options with the risk owner. B. Escalate the issue to senior management C. Implement compensating controls to reduce residual risk. D. Certify the control after documenting the concern

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Q.No.1 Which of the following is MOST important for an organization that wants to reduce IT
operational risk?

A. Increasing senior management's understanding of IT operations
B. Increasing the frequency of data backups
C. Minimizing complexity of IT infrastructure
D. Decentralizing IT infrastructure


Q.No.2 Deviation from a mitigation action plan's completion date should be determined by
which of the following?

A. Benchmarking analysis with similar completed projects
B. Change management as determined by a change control board
C. The risk owner as determined by risk management processes
D. Project governance criteria as determined by the project office


Q.No.3 A business unit has decided to accept the risk of implementing an off-the-shelf,
commercial software package that uses weak password controls. What is the BEST course of
action?

A. Continue the implementation with no changes.
B. Obtain management approval for policy exception.
C. Select another application with strong password controls.
D. Develop an improved password software routine.


Q.No.4 Which of the following is the PRIMARY reason to have the risk management process
reviewed by a third party?

A. Validate the threat management process.
B. Obtain objective assessment of the control environment
C. Ensure the risk profile is defined and communicated.
D. Obtain an objective view of process gaps and systemic errors.

Q.No.5 In an organization dependent on data analytics to drive decision-making, which of the
following would BEST help to minimize the risk associated with inaccurate data?

A. Periodically reviewing big data strategies
B. Evaluating each of the data sources for vulnerabilities
C. Establishing an intellectual property agreement
D. Benchmarking to industry best practice

Q.No.6 Which of the following is MOST appropriate to prevent unauthorized retrieval of
confidential information stored in a business application system?

A. Implement segregation of duties.
B. Enforce an internal data access policy.
C. Apply single sign-on for access control.
D. Enforce the use of digital signatures.

,Q.No.7 The GREATEST concern when maintaining a risk register is that:

A. significant changes in risk factors are excluded.
B. impacts are recorded in qualitative terms.
C. executive management does not perform periodic reviews.
D. IT risk is not linked with IT assets,

Q.No.8 Which of the following will BEST help in communicating strategic risk priorities?

A. Heat map
B. Business impact analysis (BIA)
C. Balanced Scorecard
D. Risk register

Q.No.9 Which of the following is the BEST indicator of the effectiveness of a control action
plan's implementation?
A. Stakeholder commitment
B. Increased risk appetite
C. Reduced risk level
D. Increased number of controls


Q.No.10 Which of the following is the BEST method for identifying vulnerabilities?

A. Batch job failure monitoring
B. Periodic network scanning
C. Risk assessments
D. Annual penetration testing


Q.No.11 Which of the following will BEST ensure that information security risk factors are
mitigated when developing in-house applications?

A. Design key performance indicators (KPIs) for security in system specifications.
B. Include information security control specifications in business cases.
C. Identify key risk indicators (KRIs) as process output
D. Identify information security controls in the requirements analysis


Q.No.12 A management team is on an aggressive mission to launch a new product to
penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario
BEST demonstrates an organization's risk:

A. Tolerance.
B. culture.
C. Management.
D. analysis.
Q.No.13 During a control review, the control owner states that an existing control has
deteriorated over time. What is the BEST recommendation to the control owner?

A. Discuss risk mitigation options with the risk owner.

, B. Escalate the issue to senior management
C. Implement compensating controls to reduce residual risk.
D. Certify the control after documenting the concern.


Q.No.14 Which of the following is the BEST approach for determining whether a risk action
plan is effective?

A. Assessing changes in residual risk
B. Comparing the remediation cost against budget
C. Assessing the inherent risk
D. Monitoring changes of key performance indicators (KPIs)


Q.No.15 Who is responsible for IT security controls that are outsourced to an external service
provider?

A. Organization's information security manager
B. Organization's risk function
C. Service provider's IT management
D. Service provider's information security manager


Q.No.16 Which of the following approaches will BEST help to ensure the effectiveness of risk
awareness training?

A. Piloting courses with focus groups
B. Using reputable third-party training programs
C. Reviewing content with senior management
D. Creating modules for targeted audiences


Q.No.17 A PRIMARY advantage of involving business management in evaluating and
managing risk is that management:

A. is more objective than risk management
B. better understands the system architecture.
C. can balance technical and business risk.
D. can make better-informed business decisions.


Q.No.18 When reviewing a risk response strategy, senior management's PRIMARY focus
should be placed on the:

A. cost-benefit analysis.
B. key performance indicators (KPIs).
C. investment portfolio
D. alignment with risk appetite.


Q.No.19 The effectiveness of a control has decreased. What is the MOST likely effect on the
associated risk?

A. The risk impact changes.

Geschreven voor

Vak

Documentinformatie

Geüpload op
3 januari 2024
Aantal pagina's
25
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€16,16
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
THEEXCELLENCELIBRARY Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
18
Lid sinds
2 jaar
Aantal volgers
6
Documenten
2641
Laatst verkocht
3 maanden geleden
THE EXCELLENCE LIBRARY

The Excellence Library Where Academic Success Begins. Welcome to The Excellence Library — your trusted marketplace for past and upcoming exam papers with verified answers, spanning all academic fields. Whether you're a med student, a future lawyer, a high schooler prepping for finals, or a researcher looking for model dissertations — we've got you covered. What We Offer Accurate & Complete Exam Papers From Medicine, Nursing, Law (Bar Exams), High School subjects, and more. Model Dissertations & Novels Top-tier academic references and full-text materials to guide your writing and study. Affordable & Fair Pricing Quality resources at a price that respects students' budgets. Why Choose Us? Thoroughly Reviewed Answers – Every paper includes clear, correct solutions. Massive Library – Thousands of documents, constantly updated. Academic Excellence, Delivered – We help you prepare smarter, not harder. Fast Delivery – Get what you need, when you need it. Our Goal To empower students and professionals by offering reliable, affordable academic materials — helping you succeed one paper at a time.

Lees meer Lees minder
2,5

2 beoordelingen

5
0
4
0
3
1
2
1
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen