Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 265

Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?

A.

Assigning identification dates for risk scenarios in the risk register

B.

Updating impact assessments for risk scenario

C.

Verifying whether risk action plans have been completed

D.

Reviewing key risk indicators (KRIS)

Full Access
Question # 266

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Full Access
Question # 267

Which of the following should be the PRIMARY recipient of reports showing the

progress of a current IT risk mitigation project?

A.

Senior management

B.

Project manager

C.

Project sponsor

D.

IT risk manager

Full Access
Question # 268

A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?

A.

Identify new risk entries to include in ERM.

B.

Remove the risk entries from the ERM register.

C.

Re-perform the risk assessment to confirm results.

D.

Verify the adequacy of risk monitoring plans.

Full Access
Question # 269

Improvements in the design and implementation of a control will MOST likely result in an update to:

A.

inherent risk.

B.

residual risk.

C.

risk appetite

D.

risk tolerance

Full Access
Question # 270

Which of the following is the BEST way to mitigate the risk to IT infrastructure availability?

A.

Establishing a disaster recovery plan (DRP)

B.

Establishing recovery time objectives (RTOs)

C.

Maintaining a current list of staff contact delays

D.

Maintaining a risk register

Full Access
Question # 271

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

A.

Classification of the data

B.

Type of device

C.

Remote management capabilities

D.

Volume of data

Full Access
Question # 272

Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?

A.

Application monitoring

B.

Separation of duty

C.

Least privilege

D.

Nonrepudiation

Full Access
Go to page: