Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 297

An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?

A.

Initiate a retest of the full control

B.

Retest the control using the new application as the only sample.

C.

Review the corresponding change control documentation

D.

Re-evaluate the control during (he next assessment

Full Access
Question # 298

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

A.

stakeholder risk tolerance.

B.

benchmarking criteria.

C.

suppliers used by the organization.

D.

the control environment.

Full Access
Question # 299

Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?

A.

Digital signature

B.

Edit checks

C.

Encryption

D.

Multifactor authentication

Full Access
Question # 300

Days before the realization of an acquisition, a data breach is discovered at the company to be acquired. For the accruing organization, this situation represents which of the following?

A.

Threat event

B.

Inherent risk

C.

Risk event

D.

Security incident

Full Access
Question # 301

Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?

A.

Applying risk treatments

B.

Implementing internal controls

C.

Monitoring risk responses

D.

Providing assurance of control effectiveness

Full Access
Question # 302

Within the three lines of defense model, the responsibility for managing risk and controls resides with:

A.

operational management.

B.

the risk practitioner.

C.

the internal auditor.

D.

executive management.

Full Access
Question # 303

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.

Risk likelihood

B.

Inherent risk

C.

Risk appetite

D.

Risk tolerance

Full Access
Question # 304

Which of the following is the result of a realized risk scenario?

A.

Technical event

B.

Threat event

C.

Vulnerability event

D.

Loss event

Full Access
Go to page: