Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 81

Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?

A.

The organization may not have a sufficient number of skilled resources.

B.

Application and data migration cost for backups may exceed budget.

C.

Data may not be recoverable due to system failures.

D.

The database system may not be scalable in the future.

Full Access
Question # 82

Which of the following is MOST helpful in providing an overview of an organization's risk management program?

A.

Risk management treatment plan

B.

Risk assessment results

C.

Risk management framework

D.

Risk register

Full Access
Question # 83

Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?

A.

Software version

B.

Assigned software manager

C.

Software support contract expiration

D.

Software licensing information

Full Access
Question # 84

Which of the following provides the MOST reliable evidence of a control's effectiveness?

A.

A risk and control self-assessment

B.

Senior management's attestation

C.

A system-generated testing report

D.

detailed process walk-through

Full Access
Question # 85

Who is MOST appropriate to be assigned ownership of a control

A.

The individual responsible for control operation

B.

The individual informed of the control effectiveness

C.

The individual responsible for resting the control

D.

The individual accountable for monitoring control effectiveness

Full Access
Question # 86

The BEST key performance indicator (KPI) to measure the effectiveness of the security patching process is the percentage of patches installed:

A.

by the security administration team.

B.

successfully within the expected time frame.

C.

successfully during the first attempt.

D.

without causing an unplanned system outage.

Full Access
Question # 87

A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?

A.

Impact

B.

Residual risk

C.

Inherent risk

D.

Risk appetite

Full Access
Question # 88

Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?

A.

User acceptance testing (UAT)

B.

Database activity monitoring

C.

Source code review

D.

Vulnerability analysis

Full Access
Go to page: