Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 105

Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?

A.

To have a unified approach to risk management across the organization

B.

To have a standard risk management process for complying with regulations

C.

To optimize risk management resources across the organization

D.

To ensure risk profiles are presented in a consistent format within the organization

Full Access
Question # 106

Which of the following is the result of a realized risk scenario?

A.

Technical event

B.

Threat event

C.

Vulnerability event

D.

Loss event

Full Access
Question # 107

The PRIMARY objective for requiring an independent review of an organization's IT risk management process should be to:

A.

assess gaps in IT risk management operations and strategic focus.

B.

confirm that IT risk assessment results are expressed as business impact.

C.

verify implemented controls to reduce the likelihood of threat materialization.

D.

ensure IT risk management is focused on mitigating potential risk.

Full Access
Question # 108

Which of the following BEST indicates the effectiveness of anti-malware software?

A.

Number of staff hours lost due to malware attacks

B.

Number of downtime hours in business critical servers

C.

Number of patches made to anti-malware software

D.

Number of successful attacks by malicious software

Full Access
Question # 109

Which of the following is the BEST way to assess the effectiveness of an access management process?

A.

Comparing the actual process with the documented process

B.

Reviewing access logs for user activity

C.

Reconciling a list of accounts belonging to terminated employees

D.

Reviewing for compliance with acceptable use policy

Full Access
Question # 110

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

Full Access
Question # 111

Which of the following is the MOST important factor affecting risk management in an organization?

A.

The risk manager's expertise

B.

Regulatory requirements

C.

Board of directors' expertise

D.

The organization's culture

Full Access
Question # 112

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

A.

Replace the action owner with a more experienced individual.

B.

Implement compensating controls until the preferred action can be completed.

C.

Change the risk response strategy of the relevant risk to risk avoidance.

D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.

Full Access
Go to page: