Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 161

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.

B.

Implement a key performance indicator (KPI) to monitor the existing control performance.

C.

Accept the residual risk in its entirety and obtain executive management approval.

D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.

Full Access
Question # 162

Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?

A.

Conducting security awareness training

B.

Updating the information security policy

C.

Implementing mock phishing exercises

D.

Requiring two-factor authentication

Full Access
Question # 163

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

A.

reduces risk to an acceptable level

B.

quantifies risk impact

C.

aligns with business strategy

D.

advances business objectives.

Full Access
Question # 164

Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization's data flow model?

A.

Results of data classification activities

B.

Recent changes to enterprise architecture (EA)

C.

High-level network diagrams

D.

Notes from interviews with the data owners

Full Access
Question # 165

Which of the following would offer the MOST insight with regard to an organization's risk culture?

A.

Risk management procedures

B.

Senior management interviews

C.

Benchmark analyses

D.

Risk management framework

Full Access
Question # 166

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

A.

Periodic user privileges review

B.

Log monitoring

C.

Periodic internal audits

D.

Segregation of duties

Full Access
Question # 167

Which of the following would BEST prevent an unscheduled application of a patch?

A.

Network-based access controls

B.

Compensating controls

C.

Segregation of duties

D.

Change management

Full Access
Question # 168

Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?

A.

Historical data availability

B.

Implementation and reporting effort

C.

Ability to display trends

D.

Sensitivity and reliability

Full Access
Go to page: