Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 249

Which types of controls are BEST used to minimize the risk associated with a vulnerability?

A.

Detective

B.

Preventive

C.

Deterrent

D.

Directive

Full Access
Question # 250

A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?

A.

Encryption

B.

Authentication

C.

Configuration

D.

Backups

Full Access
Question # 251

During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?

A.

Report the infraction.

B.

Perform a risk assessment.

C.

Conduct risk awareness training.

D.

Discontinue the process.

Full Access
Question # 252

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Assigning a data owner

B.

Scheduling periodic audits

C.

Implementing technical controls over the assets

D.

Implementing a data loss prevention (DLP) solution

Full Access
Question # 253

Which of the following BEST enables the integration of IT risk management across an organization?

A.

Enterprise risk management (ERM) framework

B.

Enterprise-wide risk awareness training

C.

Robust risk reporting practices

D.

Risk management policies

Full Access
Question # 254

Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?

A.

Activate the incident response plan.

B.

Implement compensating controls.

C.

Update the risk register.

D.

Develop risk scenarios.

Full Access
Question # 255

Continuous monitoring of key risk indicators (KRIs) will:

A.

ensure that risk will not exceed the defined risk appetite of the organization.

B.

provide an early warning so that proactive action can be taken.

C.

provide a snapshot of the risk profile.

D.

ensure that risk tolerance and risk appetite are aligned.

Full Access
Question # 256

Which of the following is the MOST important consideration when prioritizing risk response?

A.

Requirements for regulatory obligations.

B.

Cost of control implementation.

C.

Effectiveness of risk treatment.

D.

Number of risk response options.

Full Access
Go to page: