Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 137

An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?

A.

Risk profile

B.

Risk tolerance

C.

Risk capacity

D.

Risk appetite

Full Access
Question # 138

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

A.

Third-party data custodian

B.

Data custodian

C.

Regional office executive

D.

Data owner

Full Access
Question # 139

A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?

A.

Risk likelihood

B.

Risk impact

C.

Risk capacity

D.

Risk appetite

Full Access
Question # 140

Which of the following will provide the BEST measure of compliance with IT policies?

A.

Evaluate past policy review reports.

B.

Conduct regular independent reviews.

C.

Perform penetration testing.

D.

Test staff on their compliance responsibilities.

Full Access
Question # 141

Which organizational role should be accountable for ensuring information assets are appropriately classified?

A.

Data protection officer

B.

Chief information officer (CIO)

C.

Information asset custodian

D.

Information asset owner

Full Access
Question # 142

Which of the following should be the HIGHEST priority when developing a risk response?

A.

The risk response addresses the risk with a holistic view.

B.

The risk response is based on a cost-benefit analysis.

C.

The risk response is accounted for in the budget.

D.

The risk response aligns with the organization's risk appetite.

Full Access
Question # 143

The BEST way for an organization to ensure that servers are compliant to security policy is

to review:

A.

change logs.

B.

configuration settings.

C.

server access logs.

D.

anti-malware compliance.

Full Access
Question # 144

Which of the following BEST reduces the likelihood of employees unintentionally disclosing sensitive information to outside parties?

A.

Regular employee security awareness training

B.

Sensitive information classification and handling policies

C.

Anti-malware controls on endpoint devices

D.

An egress intrusion detection system (IDS)

Full Access
Go to page: