Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 193

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

A.

Invoke the disaster recovery plan during an incident.

B.

Prepare a cost-benefit analysis of alternatives available

C.

Implement redundant infrastructure for the application.

D.

Reduce the recovery time by strengthening the response team.

Full Access
Question # 194

An organization has determined that risk is not being adequately tracked and

managed due to a distributed operating model. Which of the following is the

BEST way to address this issue?

A.

Increase the frequency of risk assessments.

B.

Revalidate the organization's risk appetite

C.

Create a centralized portfolio of risk scenarios.

D.

Create dashboards for risk metrics.

Full Access
Question # 195

An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?

A.

Conducting periodic vulnerability scanning

B.

Creating immutable backups

C.

Performing required patching

D.

Implementing continuous intrusion detection monitoring

Full Access
Question # 196

Which of the following is a benefit of implementing user and entity behavior analytics to help mitigate information security threats?

A.

Device activity is centrally logged.

B.

Changes to user credentials are monitored.

C.

Data assets are effectively inventoried.

D.

Attacks are identified against a baseline of activity.

Full Access
Question # 197

An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?

A.

Migrate all data to another compliant service provider.

B.

Analyze the impact of the provider's control weaknesses to the business.

C.

Conduct a follow-up audit to verify the provider's control weaknesses.

D.

Review the contract to determine if penalties should be levied against the provider.

Full Access
Question # 198

Which of the following can be used to assign a monetary value to risk?

A.

Annual loss expectancy (ALE)

B.

Business impact analysis

C.

Cost-benefit analysis

D.

Inherent vulnerabilities

Full Access
Question # 199

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

Full Access
Question # 200

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?

A.

Better understanding of the risk appetite

B.

Improving audit results

C.

Enabling risk-based decision making

D.

Increasing process control efficiencies

Full Access
Go to page: