Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 193

Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?

A.

Community cloud

B.

Private cloud

C.

Hybrid cloud

D.

Public cloud

Full Access
Question # 194

Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?

A.

Percentage of legacy servers out of support

B.

Percentage of severs receiving automata patches

C.

Number of unpremeditated vulnerabilities

D.

Number of intrusion attempts

Full Access
Question # 195

Which of the following would BEST facilitate the maintenance of data classification requirements?

A.

Scheduling periodic audits

B.

Assigning a data custodian

C.

Implementing technical controls over the assets

D.

Establishing a data loss prevention (DLP) solution

Full Access
Question # 196

Which of the following would BEST help secure online financial transactions from improper users?

A.

Review of log-in attempts

B.

multi-level authorization

C.

Periodic review of audit trails

D.

multi-factor authentication

Full Access
Question # 197

A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?

A.

The user requirements were not documented.

B.

Payroll files were not under the control of a librarian.

C.

The programmer had access to the production programs.

D.

The programmer did not involve the user in testing.

Full Access
Question # 198

IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:

A.

the cost associated with each control.

B.

historical risk assessments.

C.

key risk indicators (KRls).

D.

information from the risk register.

Full Access
Question # 199

Which of the following provides the MOST useful information to assess the magnitude of identified deficiencies in the IT control environment?

A.

Peer benchmarks

B.

Internal audit reports

C.

Business impact analysis (BIA) results

D.

Threat analysis results

Full Access
Question # 200

The MOST important characteristic of an organization s policies is to reflect the organization's:

A.

risk assessment methodology.

B.

risk appetite.

C.

capabilities

D.

asset value.

Full Access
Go to page: