Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 89

Which of the following is the BEST course of action for a system administrator who suspects a colleague may be intentionally weakening a system's validation controls in order to pass through fraudulent transactions?

A.

Implement compensating controls to deter fraud attempts.

B.

Share the concern through a whistleblower communication channel.

C.

Monitor the activity to collect evidence.

D.

Determine whether the system environment has flaws that may motivate fraud attempts.

Full Access
Question # 90

Which of the following proposed benefits is MOST likely to influence senior management approval to reallocate budget for a new security initiative?

A.

Reduction in the number of incidents

B.

Reduction in inherent risk

C.

Reduction in residual risk

D.

Reduction in the number of known vulnerabilities

Full Access
Question # 91

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

A.

Complete an offsite business continuity exercise.

B.

Conduct a compliance check against standards.

C.

Perform a vulnerability assessment.

D.

Measure the change in inherent risk.

Full Access
Question # 92

A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?

A.

Consistent forms to document risk acceptance rationales

B.

Acceptable scenarios to override risk appetite or tolerance thresholds

C.

Individuals or roles authorized to approve risk acceptance

D.

Communication protocols when a risk is accepted

Full Access
Question # 93

Which of the following is the MOST effective control to maintain the integrity of system configuration files?

A.

Recording changes to configuration files

B.

Implementing automated vulnerability scanning

C.

Restricting access to configuration documentation

D.

Monitoring against the configuration standard

Full Access
Question # 94

Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?

A.

Industry trends in Al

B.

Expected algorithm outputs

C.

Data feeds

D.

Alert functionality

Full Access
Question # 95

Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?

A.

Percentage of IT systems recovered within the mean time to restore (MTTR) during the disaster recovery test

B.

Percentage of issues arising from the disaster recovery test resolved on time

C.

Percentage of IT systems included in the disaster recovery test scope

D.

Percentage of IT systems meeting the recovery time objective (RTO) during the disaster recovery test

Full Access
Question # 96

Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?

A.

Penetration testing

B.

IT general controls audit

C.

Vulnerability assessment

D.

Fault tree analysis

Full Access
Go to page: