Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 233

An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?

A.

Risk likelihood

B.

Risk culture

C.

Risk appetite

D.

Risk capacity

Full Access
Question # 234

An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?

A.

Include a nondisclosure agreement (NDA) for personal data in the contract.

B.

Implement a digital rights protection tool to monitor data.

C.

Use a virtual private network (VPN) to communicate data.

D.

Transfer a read-only version of the data.

Full Access
Question # 235

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for

sensitive data?

A.

Assess the threat and associated impact.

B.

Evaluate risk appetite and tolerance levels

C.

Recommend device management controls

D.

Enable role-based access control.

Full Access
Question # 236

Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?

A.

Published vulnerabilities relevant to the business

B.

Threat actors that can trigger events

C.

Events that could potentially impact the business

D.

IT assets requiring the greatest investment

Full Access
Question # 237

Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?

A.

Risk management budget

B.

Risk management industry trends

C.

Risk tolerance

D.

Risk capacity

Full Access
Question # 238

Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?

A.

Segregation of duties

B.

Monetary approval limits

C.

Clear roles and responsibilities

D.

Password policies

Full Access
Question # 239

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

A.

The percentage of servers with allowed patching exceptions

B.

The number of servers with local credentials to install patches

C.

The percentage of servers patched within required service level agreements

D.

The number of servers running the software patching service

Full Access
Question # 240

Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?

A.

Physical destruction

B.

Degaussing

C.

Data anonymization

D.

Data deletion

Full Access
Go to page: