D is correct here. The main goal for regular pen tests is to find vulnerabilities in your system before attackers do. B sounds tempting but it's more about staying current with threats, not the core purpose of pentesting. Ran into a similar question on practice exams so pretty sure about this.
Q: 1
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
Options
Discussion
Option B, If the question said "most up-to-date reason" instead of "primary", would B be right over D?
Be respectful. No spam.
Q: 2
Which of the following will BEST help mitigate the risk associated with malicious functionality in
outsourced application development?
Options
Discussion
B , since test environments can catch issues that code reviews might miss, especially if the malicious code is only triggered under certain conditions. A feels like a strong pick, but sometimes dynamic analysis finds traps.
A since an in-depth code review by an expert is the strongest way to catch hidden malicious code before it goes live. Other options like SLAs or change management are important for overall process, but they won’t actually catch a developer sneaking something into the codebase. Testing environments might not trigger hidden logic either. Anyone think B could work if you had really comprehensive dynamic analysis?
Is the keyword here "BEST" referring to preventing malicious code before production, or just detecting any unwanted behavior? If it's strictly about code-level risk, I'd pick A.
Be respectful. No spam.
Q: 3
Which of the following would be MOST useful to senior management when determining an
appropriate risk response?
Options
Discussion
Hard to say, C. Practice questions from the official CRISC guide often compare current and inherent risks, so that's why I'd pick it.
D . If the question asked for a control effectiveness comparison instead of risk tolerance, would that make C more valid?
Be respectful. No spam.
Q: 4
Which of the following is the MOST important benefit of implementing a data classification program?
Options
Discussion
D , the trap here is C but classifying data mainly lets you pick proper controls. Pretty sure D fits best.
Guessing C, saw a similar question in some practice sets and ownership was the focus.
D
If the question asked for the primary organizational benefit instead of "most important," I'd probably look at C since ownership links to accountability. But since it's about direct outcome, controls identification wins here.
If the question asked for the primary organizational benefit instead of "most important," I'd probably look at C since ownership links to accountability. But since it's about direct outcome, controls identification wins here.
Be respectful. No spam.
Q: 5
After the implementation of internal of Things (IoT) devices, new risk scenarios were identified.
What is the PRIMARY reason to report this information to risk owners?
Options
Discussion
Wouldn’t risk owners need this info mainly to see if the risk profile actually changes?
Be respectful. No spam.
Q: 6
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the
environment?
Options
Discussion
Option C If the question said "most agile implementation" instead of BEST for control gaps, would B make sense?
Its C. Robust technical architecture ties all security controls together, so fewer gaps slip through. Pretty sure that’s the main idea here.
C imo . Had something like this in a mock and C was the right pick. Other options can actually increase risk of uneven controls, but robust architecture makes everything consistent. Confident about this one.
Be respectful. No spam.
Q: 7
Which of the following is the MOST significant indicator of the need to perform a penetration test?
Options
Discussion
Makes sense to me, B is the right call here. If you’re actually seeing more security incidents, that’s a direct signal the controls aren’t effective, so pen testing becomes urgent. The other stuff could be factors, but less critical imo.
Nicely worded, makes it clear. D
Be respectful. No spam.
Q: 8
Which of the following is the BEST course of action for a system administrator who suspects a
colleague may be intentionally weakening a system's validation controls in order to pass through
fraudulent transactions?
Options
Discussion
Seriously, why is B always the go-to for ISACA exams? I think C makes more sense.
Its C. If you monitor the activity, you can collect solid evidence before escalating. I saw something similar in a practice set and it recommended gathering proof first instead of immediately reporting. Anyone else pick this?
Be respectful. No spam.
Q: 9
Which of the following is the BEST way for a risk practitioner to verify that management has
addressed control issues identified during a previous external audit?
Options
Discussion
Option B. If the question asked for the FIRST step instead of BEST, would A make more sense?
D imo
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2