Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 73

An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?

A.

Feedback from end users

B.

Results of a benchmark analysis

C.

Recommendations from internal audit

D.

Prioritization from business owners

Full Access
Question # 74

IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:

A.

the cost associated with each control.

B.

historical risk assessments.

C.

key risk indicators (KRls).

D.

information from the risk register.

Full Access
Question # 75

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Full Access
Question # 76

Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?

A.

A risk roadmap

B.

A balanced scorecard

C.

A heat map

D.

The risk register

Full Access
Question # 77

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

A.

To deliver projects on time and on budget

B.

To assess inherent risk

C.

To include project risk in the enterprise-wide IT risk profit.

D.

To assess risk throughout the project

Full Access
Question # 78

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.

Prioritizing and addressing risk in line with risk appetite. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

Full Access
Question # 79

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

A.

involve IT leadership in the policy development process

B.

Require business users to sign acknowledgment of the poises

C.

involve business owners in the pokey development process

D.

Provide policy owners with greater enforcement authority

Full Access
Question # 80

It is MOST important that security controls for a new system be documented in:

A.

testing requirements

B.

the implementation plan.

C.

System requirements

D.

The security policy

Full Access
Go to page: