Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 249

Which of the following is the GREATEST concern associated with redundant data in an organization's inventory system?

A.

Poor access control

B.

Unnecessary data storage usage

C.

Data inconsistency

D.

Unnecessary costs of program changes

Full Access
Question # 250

When of the following 15 MOST important when developing a business case for a proposed security investment?

A.

identification of control requirements

B.

Alignment to business objectives

C.

Consideration of new business strategies

D.

inclusion of strategy for regulatory compliance

Full Access
Question # 251

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 252

Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?

A.

Segregation of duties

B.

Code review

C.

Change management

D.

Audit modules

Full Access
Question # 253

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

A.

Transfer

B.

Mitigation

C.

Avoidance

D.

Acceptance

Full Access
Question # 254

The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:

A.

results of a business impact analysis (BIA).

B.

the original risk response plan.

C.

training program and user awareness documentation.

D.

a post-implementation risk and control self-assessment (RCSA).

Full Access
Question # 255

Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?

A.

Number of active nodes

B.

Blockchain size in gigabytes

C.

Average transaction speed

D.

Number of validated transactions

Full Access
Question # 256

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:

A.

IT policy exceptions granted.

B.

Senior management approvals.

C.

Key technology controls covered by IT policies.

D.

Processes covered by IT policies.

Full Access
Go to page: