Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 185

Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?

A.

Cost-benefit analysis

B.

Penetration testing

C.

Business impact analysis (BIA)

D.

Security assessment

Full Access
Question # 186

Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization's data flow model?

A.

Results of data classification activities

B.

Recent changes to enterprise architecture (EA)

C.

High-level network diagrams

D.

Notes from interviews with the data owners

Full Access
Question # 187

Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?

A.

Cyber threat intelligence

B.

Anti-malware software

C.

Endpoint detection and response (EDR)

D.

SIEM systems

Full Access
Question # 188

Which of the following is MOST important for an organization to have in place when developing a risk management framework?

A.

A strategic approach to risk including an established risk appetite

B.

A risk-based internal audit plan for the organization

C.

A control function within the risk management team

D.

An organization-wide risk awareness training program

Full Access
Question # 189

When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?

A.

a identity conditions that may cause disruptions

B.

Review incident response procedures

C.

Evaluate the probability of risk events

D.

Define metrics for restoring availability

Full Access
Question # 190

Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?

A.

Implement a fraud detection and prevention framework.

B.

Ensure the alignment of the organization's policies and standards to the defined risk appetite.

C.

Establish an enterprise-wide ethics training and awareness program.

D.

Perform a comprehensive review of all applicable legislative frameworks and requirements.

Full Access
Question # 191

The MOST important consideration when selecting a control to mitigate an identified risk is whether:

A.

the cost of control exceeds the mitigation value

B.

there are sufficient internal resources to implement the control

C.

the mitigation measures create compounding effects

D.

the control eliminates the risk

Full Access
Question # 192
A.

In the design phase.

B.

During pre-production testing.

C.

Once in the production environment.

D.

Throughout development.

Full Access
Go to page: