Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 273

Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?

A.

The policy lacks specifics on how to secure the organization's systems from cyberattacks.

B.

The policy has gaps against relevant cybersecurity standards and frameworks.

C.

The policy has not been reviewed by the cybersecurity team in over a year.

D.

The policy has not been approved by the organization's board.

Full Access
Question # 274

The MOST essential content to include in an IT risk awareness program is how to:

A.

define the IT risk framework for the organization

B.

populate risk register entries and build a risk profile for management reporting

C.

comply with the organization's IT risk and information security policies

D.

prioritize IT-related actions by considering risk appetite and risk tolerance

Full Access
Question # 275

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

A.

Failure to test the disaster recovery plan (DRP)

B.

Lack of well-documented business impact analysis (BIA)

C.

Lack of annual updates to the disaster recovery plan (DRP)

D.

Significant changes in management personnel

Full Access
Question # 276

Which of the following provides the BEST indication that existing controls are effective?

A.

Control testing

B.

Control logging

C.

Control documentation

D.

Control design

Full Access
Question # 277

As part of an overall IT risk management plan, an IT risk register BEST helps management:

A.

align IT processes with business objectives.

B.

communicate the enterprise risk management policy.

C.

stay current with existing control status.

D.

understand the organizational risk profile.

Full Access
Question # 278

When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?

A.

List of recent incidents affecting industry peers

B.

Results of external attacks and related compensating controls

C.

Gaps between current and desired states of the control environment

D.

Review of leading IT risk management practices within the industry

Full Access
Question # 279

Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST

A.

review the key risk indicators.

B.

conduct a risk analysis.

C.

update the risk register

D.

reallocate risk response resources.

Full Access
Question # 280

Which of the following is the BEST approach for determining whether a risk action plan is effective?

A.

Comparing the remediation cost against budget

B.

Assessing changes in residual risk

C.

Assessing the inherent risk

D.

Monitoring changes of key performance indicators(KPIs)

Full Access
Go to page: