Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 225

Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?

A.

User authorization

B.

User recertification

C.

Change log review

D.

Access log monitoring

Full Access
Question # 226

In which of the following scenarios would a risk practitioner be required to provide the MOST justification for a risk assessment?

A.

Modeling a threat-based risk event

B.

Calculating mean time between failures (MTBF)

C.

Using a semi-quantitative approach

D.

Calculating adjusted loss expectancy (ALE)

Full Access
Question # 227

An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?

A.

Acceptance

B.

Avoidance

C.

Transfer

D.

Reduction

Full Access
Question # 228

Which of the following is the BEST indicator of the effectiveness of a control action plan ' s implementation?

A.

Increased number of controls

B.

Reduced risk level

C.

Increased risk appetite

D.

Stakeholder commitment

Full Access
Question # 229

What is the MAIN benefit of using a top-down approach to develop risk scenarios?

A.

It describes risk events specific to technology used by the enterprise.

B.

It establishes the relationship between risk events and organizational objectives.

C.

It uses hypothetical and generic risk events specific to the enterprise.

D.

It helps management and the risk practitioner to refine risk scenarios.

Full Access
Question # 230

During an IT department reorganization, the manager of a risk mitigation action plan was replaced. The new manager has begun implementing a new control after identifying a more effective option. Which of the following is the risk practitioner ' s BEST course of action?

A.

Communicate the decision to the risk owner for approval

B.

Seek approval from the previous action plan manager.

C.

Identify an owner for the new control.

D.

Modify the action plan in the risk register.

Full Access
Question # 231

Which of the following is the PRIMARY role of the board of directors in corporate risk governance?

A.

Approving operational strategies and objectives

B.

Monitoring the results of actions taken to mitigate risk

C.

Ensuring the effectiveness of the risk management program

D.

Ensuring risk scenarios are identified and recorded in the risk register

Full Access
Question # 232

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Full Access
Go to page: