CRISC 試験問題 971
Which of the following scenarios represents a threat?
正解: D
A virus transmitted on a USB thumb drive is a scenario that represents a threat, as it involves a malicious or harmful event that could compromise the confidentiality, integrity, or availability of an information system. A virus is a type of malware that can infect and damage files, programs, or devices by replicating itself and spreading to other systems or networks. A USB thumb drive is a portable storage device that can be used to transfer data between computers or devices. A virus transmitted on a USB thumb drive can occur when a user inserts an infected USB thumb drive into a computer or device, or when a user downloads or copies an infected file from a USB thumb drive to a computer or device. A virus transmitted on a USB thumb drive can pose a serious risk to the information system, as it can corrupt or delete data, disrupt or degrade performance, steal or leak information, or allow unauthorized access or control.
The other options are not scenarios that represent a threat, but rather vulnerabilities or weaknesses that could increase the likelihood or impact of a threat. Connecting a laptop to a free, open, wireless access point (hotspot) is a vulnerability, as it exposes the laptop to potential eavesdropping, interception, or manipulation by malicious actors on the same network. Visitors not signing in as per policy is a vulnerability, as it creates a gap in the physical security and access control of the premises, and could allow unauthorized or malicious visitors to enter or access sensitive areas or assets. Storing corporate data in unencrypted form on a laptop is a vulnerability, as it reduces the protection and security of the data, and could enable unauthorized or malicious access, disclosure, or modification of the data in case of loss, theft, or compromise of the laptop. References
= What is a Computer Virus? | McAfee, What is a USB Flash Drive? | Kingston Technology, Threats, Vulnerabilities, and Exploits - oh my!
The other options are not scenarios that represent a threat, but rather vulnerabilities or weaknesses that could increase the likelihood or impact of a threat. Connecting a laptop to a free, open, wireless access point (hotspot) is a vulnerability, as it exposes the laptop to potential eavesdropping, interception, or manipulation by malicious actors on the same network. Visitors not signing in as per policy is a vulnerability, as it creates a gap in the physical security and access control of the premises, and could allow unauthorized or malicious visitors to enter or access sensitive areas or assets. Storing corporate data in unencrypted form on a laptop is a vulnerability, as it reduces the protection and security of the data, and could enable unauthorized or malicious access, disclosure, or modification of the data in case of loss, theft, or compromise of the laptop. References
= What is a Computer Virus? | McAfee, What is a USB Flash Drive? | Kingston Technology, Threats, Vulnerabilities, and Exploits - oh my!
CRISC 試験問題 972
次のどれが、Web アプリケーションに実装されたセキュリティ制御の有効性に関する最も信頼性の高い証拠となるでしょうか?
正解: A
The most reliable evidence of the effectiveness of security controls implemented for a web application is penetration testing. Penetration testing is a process that simulates an attack on the web application by exploiting its vulnerabilities, using the same tools and techniques as real attackers. Penetration testing helps to evaluate the effectiveness of security controls, because it helps to verify that the security controls can prevent, detect, or mitigate the attack, and to measure the impact and severity of the attack. Penetration testing also helps to identify and address any weaknesses or gaps in the security controls, and to provide recommendations and solutions for improving the security of the web application. The other options are not as reliable as penetration testing, although they may provide some evidence of the effectiveness of security controls. IT general controls audit, vulnerability assessment, and fault tree analysis are all examples of analytical or evaluative methods, which may help to assess or estimate the effectiveness of security controls, but they do not necessarily test or measure the effectiveness of security controls in a realistic scenario. References = 10
CRISC 試験問題 973
Which of the following controls is an example of non-technical controls?
正解: B
A, and D are incorrect. Intrusion detection system, access control, and encryption are the safeguards that are incorporated into computer hardware, software or firmware, hence they refer to as technical controls.
CRISC 試験問題 974
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
正解: D
The chief information officer (CIO) is the most likely person to be responsible for the coordination between the IT risk strategy and the business risk strategy, because the CIO is the senior executive who oversees the information technology (IT) function and aligns it with the organization's strategy, objectives, and operations.
The CIO is also responsible for ensuring that the IT function delivers value, supports innovation, and manages IT risks effectively and efficiently. The CIO can coordinate the IT risk strategy and the business risk strategy by communicating and collaborating with other business leaders, establishing and implementing IT governance frameworks and policies, and monitoring and reporting on IT performance and risk indicators. The other options are not as likely as the CIO to be responsible for the coordination between the IT risk strategy and the business risk strategy, because they have different or limited roles and responsibilities in relation to IT and business risk management, as explained below:
* A. Chief financial officer (CFO) is the senior executive who oversees the financial function and manages the financial risks of the organization. The CFO may be involved in the coordination between the IT risk strategy and the business risk strategy, especially when it comes to budgeting, funding, or reporting on IT-related projects and initiatives, but the CFO is not the primary person who oversees the IT function and aligns it with the organization's strategy and objectives.
* B. Information security director is the senior manager who oversees the information security function and manages the information security risks of the organization. The information security director may be involved in the coordination between the IT risk strategy and the business risk strategy, especially when it comes to protecting the confidentiality, integrity, and availability of the information assets and systems, but the information security director is not the primary person who oversees the IT function and aligns it with the organization's strategy and objectives.
* C. Internal audit director is the senior manager who oversees the internal audit function and provides independent assurance on the effectiveness and efficiency of the organization's governance, risk
* management, and control processes. The internal audit director may be involved in the coordination between the IT risk strategy and the business risk strategy, especially when it comes to auditing, reviewing, or testing the IT-related processes and controls, but the internal audit director is not the primary person who oversees the IT function and aligns it with the organization's strategy and objectives. References = Risk and Information Systems Control Study Manual, Chapter 1, Section 1.1.1, page 7. The Strategic CIO: Balancing Business and IT Priorities, Technology's Role in Enterprise Risk Management, Aligning Enterprise Cyber Risk and Business Strategy
The CIO is also responsible for ensuring that the IT function delivers value, supports innovation, and manages IT risks effectively and efficiently. The CIO can coordinate the IT risk strategy and the business risk strategy by communicating and collaborating with other business leaders, establishing and implementing IT governance frameworks and policies, and monitoring and reporting on IT performance and risk indicators. The other options are not as likely as the CIO to be responsible for the coordination between the IT risk strategy and the business risk strategy, because they have different or limited roles and responsibilities in relation to IT and business risk management, as explained below:
* A. Chief financial officer (CFO) is the senior executive who oversees the financial function and manages the financial risks of the organization. The CFO may be involved in the coordination between the IT risk strategy and the business risk strategy, especially when it comes to budgeting, funding, or reporting on IT-related projects and initiatives, but the CFO is not the primary person who oversees the IT function and aligns it with the organization's strategy and objectives.
* B. Information security director is the senior manager who oversees the information security function and manages the information security risks of the organization. The information security director may be involved in the coordination between the IT risk strategy and the business risk strategy, especially when it comes to protecting the confidentiality, integrity, and availability of the information assets and systems, but the information security director is not the primary person who oversees the IT function and aligns it with the organization's strategy and objectives.
* C. Internal audit director is the senior manager who oversees the internal audit function and provides independent assurance on the effectiveness and efficiency of the organization's governance, risk
* management, and control processes. The internal audit director may be involved in the coordination between the IT risk strategy and the business risk strategy, especially when it comes to auditing, reviewing, or testing the IT-related processes and controls, but the internal audit director is not the primary person who oversees the IT function and aligns it with the organization's strategy and objectives. References = Risk and Information Systems Control Study Manual, Chapter 1, Section 1.1.1, page 7. The Strategic CIO: Balancing Business and IT Priorities, Technology's Role in Enterprise Risk Management, Aligning Enterprise Cyber Risk and Business Strategy
CRISC 試験問題 975
リスク管理担当者にとって、組織のプロセスを認識することが最も重要です。
正解: B
リスク担当者が組織のプロセスを認識して潜在的なリスク源を特定することは、最も重要です。これにより、リスク担当者はプロセスの目的、活動、リソース、依存関係、および出力を理解し、不確実性や変動性を生み出す内部または外部の要因がそれらにどのような影響を与えるかを理解できるようになります。潜在的なリスク源を特定することは、組織の目標達成に影響を与える可能性のあるリスクを見つけ、認識し、説明することを目的とするリスク識別プロセスの第一歩です。その他のオプションは、組織のプロセスに関連または有益な側面である可能性がありますが、リスク担当者が組織のプロセスを認識する最も重要な理由ではありません。
ビジネス影響分析の実行はリスク分析プロセスの一部であり、リスクの性質と範囲、および組織の目的と機能に対するリスクの影響を理解することを目指しています。
Establishing risk guidelines is a part of the risk governance process, which aims to define and communicate the risk management principles, policies, and roles across the organization. Understanding control design is a part of the risk response process, which aims to select and implement the appropriate actions to modify the risk level or achieve the risk objectives. References = Risk and Information Systems Control Study Manual, Chapter 2: IT Risk Identification, page 47.
ビジネス影響分析の実行はリスク分析プロセスの一部であり、リスクの性質と範囲、および組織の目的と機能に対するリスクの影響を理解することを目指しています。
Establishing risk guidelines is a part of the risk governance process, which aims to define and communicate the risk management principles, policies, and roles across the organization. Understanding control design is a part of the risk response process, which aims to select and implement the appropriate actions to modify the risk level or achieve the risk objectives. References = Risk and Information Systems Control Study Manual, Chapter 2: IT Risk Identification, page 47.

CRISC プレミアム問題集
365日無料更新
専門家プレゼンツ
1745 問題と解答
Windows / Mac / Android / iOS などをサポート
最新 ISACA CRISC 試験問題集は GoShiken.com のサポートで CRISC 試験を合格させます!
(40%OFF 特別割引: JPNPDF)
- 他のバージョン
- 1323ISACA.CRISC.v2025-03-28.q924
- 988ISACA.CRISC.v2024-07-31.q668
- 3196ISACA.CRISC.v2023-07-03.q712
- 5601ISACA.CRISC.v2022-10-19.q897
- 最新アップロード
- 127SAP.C-TS412-2021.v2025-09-06.q90
- 157Microsoft.MB-700.v2025-09-06.q281
- 143Docker.DCA.v2025-09-06.q175
- 113SAP.C-BCFIN-2502.v2025-09-05.q12
- 124Avaya.77201X.v2025-09-05.q58
- 109Oracle.1Z0-1079-24.v2025-09-05.q19
- 113NBMTM.BCMTMS.v2025-09-05.q33
- 109Huawei.H19-423_V1.0.v2025-09-04.q138
- 116Nokia.4A0-113.v2025-09-04.q69
- 137Microsoft.PL-200.v2025-09-04.q112