Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 169

Which of the following is the MOST important data attribute of key risk indicators (KRIs)?

A.

The data is measurable.

B.

The data is calculated continuously.

C.

The data is relevant.

D.

The data is automatically produced.

Full Access
Question # 170

The BEST metric to demonstrate that servers are configured securely is the total number of servers:

A.

exceeding availability thresholds

B.

experiencing hardware failures

C.

exceeding current patching standards.

D.

meeting the baseline for hardening.

Full Access
Question # 171

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

A.

chief risk officer.

B.

project manager.

C.

chief information officer.

D.

business process owner.

Full Access
Question # 172

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

Full Access
Question # 173

Which of the following is the PRIMARY objective of maintaining an information asset inventory?

A.

To provide input to business impact analyses (BIAs)

B.

To protect information assets

C.

To facilitate risk assessments

D.

To manage information asset licensing

Full Access
Question # 174

A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?

A.

Business analyst

B.

Project sponsor

C.

IT project team

D.

IT project management office (PMO)

Full Access
Question # 175

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

A.

Risk analysis results

B.

Exception handling policy

C.

Vulnerability assessment results

D.

Benchmarking assessments

Full Access
Question # 176

Which of the following BEST indicates the efficiency of a process for granting access privileges?

A.

Average time to grant access privileges

B.

Number of changes in access granted to users

C.

Average number of access privilege exceptions

D.

Number and type of locked obsolete accounts

Full Access
Go to page: