New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Isaca CRISC Exam - Topic 8 Question 49 Discussion

Actual exam question for Isaca's CRISC exam
Question #: 49
Topic #: 8
[All CRISC Questions]

An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Pearly
4 months ago
Wait, are we really saying business benefits matter less? That’s wild!
upvoted 0 times
...
Gennie
4 months ago
Totally agree, data classification should be the priority here.
upvoted 0 times
...
Audra
4 months ago
Volume of data is key too, but data classification is crucial.
upvoted 0 times
...
Sarina
4 months ago
Really? I thought the business benefits were more important.
upvoted 0 times
...
Hannah
5 months ago
Gotta consider the classification of the data first!
upvoted 0 times
...
Tiffiny
5 months ago
The volume of data seems less relevant compared to how sensitive the data is. I think classification might be the best choice, but I’m not completely confident.
upvoted 0 times
...
Son
5 months ago
I’m not entirely sure, but I think the business benefits of shadow IT might be a key factor too. We had a practice question that emphasized weighing risks against potential gains.
upvoted 0 times
...
Maddie
5 months ago
I remember we discussed the importance of understanding the classification of data in relation to shadow IT risks. It seems like that could be crucial here.
upvoted 0 times
...
Gregoria
5 months ago
I feel like application-related risks are important, but I can't recall if they are the most critical input. We did cover similar scenarios in class.
upvoted 0 times
...
Ty
5 months ago
Okay, I think I've got it. The diagram shows a spoke-to-spoke via hub topology, which matches option B. Time to mark that down and move on to the next question.
upvoted 0 times
...
Margarita
5 months ago
Okay, I think I've got a good handle on this. The key is to focus on the potential issues with the automated regression testing process that could allow the defect to slip through.
upvoted 0 times
...
Justine
5 months ago
This feels similar to the practice questions where we analyzed call flows and IP addressing, but I can't recall the exact IP for this scenario.
upvoted 0 times
...
Nobuko
5 months ago
This is a great question to test our understanding of injection vulnerabilities. Based on the description, SQL Injection seems like the most relevant answer choice here. I'll double-check the other options, but I'm feeling confident about SQL Injection as the correct answer.
upvoted 0 times
...

Save Cancel