Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 241

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Full Access
Question # 242

Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?

A.

Avoidance

B.

Acceptance

C.

Mitigation

D.

Transfer

Full Access
Question # 243

Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?

A.

The number of threats to the system

B.

The organization's available budget

C.

The number of vulnerabilities to the system

D.

The level of acceptable risk to the organization

Full Access
Question # 244

An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?

A.

Risk owner

B.

IT risk manager

C.

Server administrator

D.

Risk practitioner

Full Access
Question # 245

Upon learning that the number of failed backup attempts continually exceeds

the current risk threshold, the risk practitioner should:

A.

initiate corrective action to address the known deficiency.

B.

adjust the risk threshold to better reflect actual performance.

C.

inquire about the status of any planned corrective actions.

D.

keep monitoring the situation as there is evidence that this is normal.

Full Access
Question # 246

An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?

A.

Most recent IT audit report results

B.

Replacement cost of IT assets

C.

Current annualized loss expectancy report

D.

Cyber insurance industry benchmarking report

Full Access
Question # 247

Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?

A.

Monitoring digital platforms that disseminate inaccurate or misleading news stories

B.

Engaging public relations personnel to debunk false stories and publications

C.

Restricting the use of social media on corporate networks during specific hours

D.

Providing awareness training to understand and manage these types of attacks

Full Access
Question # 248

Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?

A.

Business strategies and needs

B.

Security features and support

C.

Costs and benefits

D.

Local laws and regulations

Full Access
Go to page: