Go Back on CRISC Exam
Available in 1, 3, 6 and 12 Months Free Updates Plans
PDF: $15 $60

Test Engine: $20 $80

PDF + Engine: $25 $99

CRISC Practice Test


Page 16 out of 193 Pages

Topic 2 : Pool B Jul-Aug-Sep

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?


A.

Ask the business to make a budget request to remediate the problem.


B.

Build a business case to remediate the fix.


C.

Research the types of attacks the threat can present.


D.

Determine the impact of the missing threat.





D.
  

Determine the impact of the missing threat.



Which of the following is the MOST common concern associated with outsourcing to a service provider?


A.

Lack of technical expertise


B.

Combining incompatible duties


C.

Unauthorized data usage


D.

Denial of service attacks





B.
  

Combining incompatible duties



Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?


A.

Obtaining funding support


B.

Defining the risk assessment scope


C.

Selecting the risk assessment framework


D.

Establishing inherent risk





B.
  

Defining the risk assessment scope



When prioritizing risk response, management should FIRST:


A.

evaluate the organization s ability and expertise to implement the solution.


B.

evaluate the risk response of similar organizations.


C.

address high risk factors that have efficient and effective solutions.


D.

determine which risk factors have high remediation costs





C.
  

address high risk factors that have efficient and effective solutions.



Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?


A.

Updating multi-factor authentication


B.

Monitoring key access control performance indicators


C.

Analyzing access control logs for suspicious activity


D.

Revising the service level agreement (SLA





B.
  

Monitoring key access control performance indicators




Page 16 out of 193 Pages
Previous