Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Isaca Certification CRISC Book

Page: 6 / 136
Total 1810 questions

Certified in Risk and Information Systems Control Questions and Answers

Question 21

Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?

Options:

A.

Identify information security controls in the requirements analysis

B.

Identify key risk indicators (KRIs) as process output.

C.

Design key performance indicators (KPIs) for security in system specifications.

D.

Include information security control specifications in business cases.

Question 22

Who is MOST appropriate to be assigned ownership of a control

Options:

A.

The individual responsible for control operation

B.

The individual informed of the control effectiveness

C.

The individual responsible for resting the control

D.

The individual accountable for monitoring control effectiveness

Question 23

Which of the following is MOST effective in continuous risk management process improvement?

Options:

A.

Periodic assessments

B.

Change management

C.

Awareness training

D.

Policy updates

Question 24

Which of the following BEST protects organizational data within a production cloud environment?

Options:

A.

Data encryption

B.

Continuous log monitoring

C.

Right to audit

D.

Data obfuscation

Page: 6 / 136
Total 1810 questions