Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Isaca Certification CRISC Release Date

Page: 7 / 131
Total 1745 questions

Certified in Risk and Information Systems Control Questions and Answers

Question 25

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

Options:

A.

A record of incidents is maintained.

B.

Forensic investigations are facilitated.

C.

Security violations can be identified.

D.

Developing threats are detected earlier.

Question 26

Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?

Options:

A.

System owner

B.

Internal auditor

C.

Process owner

D.

Risk owner

Question 27

When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?

Options:

A.

An analysis of the security logs that illustrate the sequence of events

B.

An analysis of the impact of similar attacks in other organizations

C.

A business case for implementing stronger logical access controls

D.

A justification of corrective action taken

Question 28

Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?

Options:

A.

Key risk indicators (KRIs)

B.

Risk governance charter

C.

Organizational risk appetite

D.

Cross-business representation

Page: 7 / 131
Total 1745 questions