Reader small image

You're reading from  ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide

Product typeBook
Published inSep 2023
PublisherPackt
ISBN-139781803236902
Edition1st Edition
Right arrow
Author (1)
Shobhit Mehta
Shobhit Mehta
author image
Shobhit Mehta

Shobhit Mehta is the Security and Compliance Director at Headspace, an on-demand mental health company in San Francisco, CA. Previously, he worked in different facets of security and assurance with HSBC, Deutsche Bank, Credit Suisse, PayPal, and Fidelity Investments. He also works with ISACA to develop exam questions for CISA, CISM, and CGEIT, served as the technical reviewer for the CGEIT and CISA review manuals, and is a published author for the COBIT 5 journal. He completed his MS in cybersecurity at Northeastern University, Boston, and holds CRISC, CISM, CISA, CGEIT, CISSP, and CCSP certifications. In his spare time, he likes to explore the inclined trails of the Bay Area, complete ultramarathons, and blog on GRCMusings.
Read more about Shobhit Mehta

Right arrow

Review questions

  1. Which of the following is not a control category?
    1. Additive
    2. Preventative
    3. Deterrent
    4. Detective
  2. Implementing controls proactively based on a previous root cause analysis is an example of which control category?
    1. Preventive
    2. Detective
    3. Corrective
    4. Compensating
  3. Reviewing audit logs in a SIEM tool is an example of __.
    1. Corrective control
    2. Detective control
    3. Compensating control
    4. Deterrent control
  4. Installing security cameras to secure a data center location is an example of __.
    1. Corrective control
    2. Detective control
    3. Compensating control
    4. Deterrent control
  5. A risk manager introduced additional oversight of an accounting system where logical controls are not yet implemented. This is an example of ___.
    1. Corrective control
    2. Detective control
    3. Compensating control
    4. Deterrent control
  6. An IT system failed while new changes were being pushed to it from the production team and lost some data. The risk manager has advised the IT team to restore the data from previous backups. This is an example...
lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide
Published in: Sep 2023Publisher: PacktISBN-13: 9781803236902

Author (1)

author image
Shobhit Mehta

Shobhit Mehta is the Security and Compliance Director at Headspace, an on-demand mental health company in San Francisco, CA. Previously, he worked in different facets of security and assurance with HSBC, Deutsche Bank, Credit Suisse, PayPal, and Fidelity Investments. He also works with ISACA to develop exam questions for CISA, CISM, and CGEIT, served as the technical reviewer for the CGEIT and CISA review manuals, and is a published author for the COBIT 5 journal. He completed his MS in cybersecurity at Northeastern University, Boston, and holds CRISC, CISM, CISA, CGEIT, CISSP, and CCSP certifications. In his spare time, he likes to explore the inclined trails of the Bay Area, complete ultramarathons, and blog on GRCMusings.
Read more about Shobhit Mehta