CRISC Certified in Risk and Information Systems Control – Question823

Controls should be defined during the design phase of system development because:

A.
technical specifications are defined during this phase.
B. structured programming techniques require that controls be designed before coding begins.
C. its more cost-effective to determine controls in the early design phase.
D. structured analysis techniques exclude identification of controls.

Correct Answer: B

CRISC Certified in Risk and Information Systems Control – Question821

Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?

A.
Performance information in the log is encrypted.
B. Control owners approve control changes.
C. Objectives are confirmed with the business owner.
D. End-user acceptance testing has been conducted.

Correct Answer: D

CRISC Certified in Risk and Information Systems Control – Question820

The PRIMARY purpose of IT control status reporting is to:

A.
assist internal audit in evaluating and initiating remediation efforts.
B. ensure compliance with IT governance strategy.
C. facilitate the comparison of the current and desired states.
D. benchmark IT controls with industry standards.

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question819

An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?

A.
The reason some databases have not been encrypted.
B. A list of unencrypted databases which contain sensitive data.
C. The cost required to enforce encryption.
D. The number of users who can access sensitive data.

Correct Answer: A

CRISC Certified in Risk and Information Systems Control – Question818

A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner’s PRIMARY concern?

A.
Security of the test environment.
B. Readability of test data.
C. Sensitivity of the data.
D. Availability of data to authorized staff.

Correct Answer: C