Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 209

Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?

A.

The skill level required of a threat actor

B.

The amount of personally identifiable information (PH) disclosed

C.

The ability to detect and trace the threat action

D.

The amount of data that might be exposed by a threat action

Full Access
Question # 210

Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?

A.

Perform an audit.

B.

Conduct a risk analysis.

C.

Develop risk scenarios.

D.

Perform a cost-benefit analysis.

Full Access
Question # 211

A technology company is developing a strategic artificial intelligence (Al)-driven application that has high potential business value. At what point should the enterprise risk profile be updated?

A.

After user acceptance testing (UAT)

B.

Upon approval of the business case

C.

When user stories are developed

D.

During post-implementation review

Full Access
Question # 212

A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?

A.

Training and awareness of employees for increased vigilance

B.

Increased monitoring of executive accounts

C.

Subscription to data breach monitoring sites

D.

Suspension and takedown of malicious domains or accounts

Full Access
Question # 213

Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?

A.

SWOT analysis

B.

Business impact analysis (BIA)

C.

Cost-benefit analysis

D.

Root cause analysis

Full Access
Question # 214

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

A.

Assemble an incident response team.

B.

Create a disaster recovery plan (DRP).

C.

Develop a risk response plan.

D.

Initiate a business impact analysis (BIA).

Full Access
Question # 215

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Full Access
Question # 216

Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?

A.

Definition of disaster recovery plan (DRP) scope and key stakeholders

B.

Recovery time and maximum acceptable data loss thresholds

C.

A checklist including equipment, location of data backups, and backup sites

D.

A list of business areas and critical functions subject to risk analysis

Full Access
Go to page: