Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 81

A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?

A.

Encryption

B.

Authentication

C.

Configuration

D.

Backups

Full Access
Question # 82

Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization's current risk profile?

A.

Hire consultants specializing m the new technology.

B.

Review existing risk mitigation controls.

C.

Conduct a gap analysis.

D.

Perform a risk assessment.

Full Access
Question # 83

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

A.

Conduct social engineering testing.

B.

Audit security awareness training materials.

C.

Administer an end-of-training quiz.

D.

Perform a vulnerability assessment.

Full Access
Question # 84

Which of the following would present the MOST significant risk to an organization when updating the incident response plan?

A.

Obsolete response documentation

B.

Increased stakeholder turnover

C.

Failure to audit third-party providers

D.

Undefined assignment of responsibility

Full Access
Question # 85

Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?

A.

Performing a vulnerability assessment on the loT devices

B.

Designing loT architecture with IT security controls from the start

C.

Implementing key risk indicators (KRIs) for loT devices

D.

To ensure risk trend data is collected and reported

Full Access
Question # 86

Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?

A.

Senior management has approved the control design.

B.

Inherent risk has been reduced from original levels.

C.

Residual risk remains within acceptable levels.

D.

Costs for control maintenance are reasonable.

Full Access
Question # 87

The risk appetite for an organization could be derived from which of the following?

A.

Cost of controls

B.

Annual loss expectancy (ALE)

C.

Inherent risk

D.

Residual risk

Full Access
Question # 88

A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?

A.

Review the design of the machine learning model against control objectives.

B.

Adopt the machine learning model as a replacement for current manual access reviews.

C.

Ensure the model assists in meeting regulatory requirements for access controls.

D.

Discourage the use of emerging technologies in key processes.

Full Access
Go to page: