Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 177

Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

A.

Data duplication processes

B.

Data archival processes

C.

Data anonymization processes

D.

Data protection processes

Full Access
Question # 178

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

A.

Service level agreement

B.

Customer service reviews

C.

Scope of services provided

D.

Right to audit the provider

Full Access
Question # 179

Which of the following sources is MOST relevant to reference when updating security awareness training materials?

A.

Risk management framework

B.

Risk register

C.

Global security standards

D.

Recent security incidents reported by competitors

Full Access
Question # 180

Which of the following is MOST important when developing risk scenarios?

A.

The scenarios are based on industry best practice.

B.

The scenarios focus on current vulnerabilities.

C.

The scenarios are relevant to the organization.

D.

The scenarios include technical consequences.

Full Access
Question # 181

Which of the following BEST facilitates the development of effective IT risk scenarios?

A.

Utilization of a cross-functional team

B.

Participation by IT subject matter experts

C.

Integration of contingency planning

D.

Validation by senior management

Full Access
Question # 182

Which of the following BEST supports ethical IT risk management practices?

A.

Robust organizational communication channels

B.

Mapping of key risk indicators (KRIs) to corporate strategy

C.

Capability maturity models integrated with risk management frameworks

D.

Rigorously enforced operational service level agreements (SLAs)

Full Access
Question # 183

A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?

A.

Consult with industry peers regarding cloud best practices.

B.

Evaluate adherence to existing IT policies and standards.

C.

Determine gaps between the current state and target framework.

D.

Adopt an industry-leading cloud computing framework.

Full Access
Question # 184

Which of the following provides a risk practitioner with the MOST reliable evidence of a third party's ability to protect the confidentiality of sensitive corporate information?

A.

A signed nondisclosure agreement (NDA)

B.

Control self-assessment (CSA) results

C.

External audit reports

D.

Internal audit reports

Full Access
Go to page: