Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 137

Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?

A.

Results of current and past risk assessments

B.

Organizational strategy and objectives

C.

Lessons learned from materialized risk scenarios

D.

Internal and external audit findings

Full Access
Question # 138

Which of the following is the MOST important enabler of effective risk management?

A.

User awareness of policies and procedures

B.

Implementation of proper controls

C.

Senior management support

D.

Continuous monitoring of threats and vulnerabilities

Full Access
Question # 139

Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:

A.

trending data is available.

B.

process flowcharts are current.

C.

measurement objectives are defined.

D.

data collection technology is available.

Full Access
Question # 140

During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?

A.

Implement compensating controls to reduce residual risk

B.

Escalate the issue to senior management

C.

Discuss risk mitigation options with the risk owner.

D.

Certify the control after documenting the concern.

Full Access
Question # 141

Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?

A.

Increased number of controls

B.

Reduced risk level

C.

Increased risk appetite

D.

Stakeholder commitment

Full Access
Question # 142

Which of the following will provide the BEST measure of compliance with IT policies?

A.

Evaluate past policy review reports.

B.

Conduct regular independent reviews.

C.

Perform penetration testing.

D.

Test staff on their compliance responsibilities.

Full Access
Question # 143

The BEST way to demonstrate alignment of the risk profile with business objectives is through:

A.

risk scenarios.

B.

risk tolerance.

C.

risk policy.

D.

risk appetite.

Full Access
Question # 144

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

A.

The head of enterprise architecture (EA)

B.

The IT risk manager

C.

The information security manager

D.

The product owner

Full Access
Go to page: