Search Header Logo

CRISC Domain 1 MCQ

Authored by John Lee

Professional Development

Professional Development

Used 4+ times

CRISC Domain 1 MCQ
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

IT Risk is measured by it's:

Level of damage to IT systems

Impact on business operations

Cost of countermeasures

Annual Loss Expectancy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is MOST important to determine when defining risk management strategies?

Risk assessment criteria

IT architecture complexity

Enterprise disaster recovery plan

Business objectives and operations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who is responsible for explaining the ramifications of a new zero-day exploit to the enterprise to senior management?

Chief Operating Officer

Chief Risk Officer

Chief Information Security Officer

Chief Information Officer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The risk to an information system that supports a critical business process is owned by:

the IT Director

Senior Management

the Risk Management department

the system users

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is MOST important when selecting an appropriate risk management methodology?

Risk culture

Countermeasure analysis

Cost benefit analysis

Risk transfer strategy

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is MOST useful when computing annual loss exposure?

The cost of existing controls

The number of vulnerabilities

The net present value of the asset

The business value of the asset

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following provides the GREATEST support to a risk practitioner recommending encryption of corporate laptops and removable media as a risk mitigation measure?

Benchmarking with peers

Evaluating public reports on encryption algorithms in the public domain

Developing a business case

Scanning unencrypted systems for vulnerabilities

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development