Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 305

A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach

A.

fail to identity all relevant issues.

B.

be too costly

C.

violate laws in other countries

D.

be too line consuming

Full Access
Question # 306

Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?

A.

Prepare a skills matrix to illustrate tasks and required expertise.

B.

Require periodic security assessments of the vendor within the contract.

C.

Perform due diligence to enable holistic assessment of the vendor.

D.

Plan a phased approach for the transition of processes to the vendor.

Full Access
Question # 307

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

A.

Do not collect or retain data that is not needed.

B.

Redact data where possible.

C.

Limit access to the personal data.

D.

Ensure all data is encrypted at rest and during transit.

Full Access
Question # 308

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

A.

Risk analysis results

B.

Exception handling policy

C.

Vulnerability assessment results

D.

Benchmarking assessments

Full Access
Question # 309

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

A.

Methods of attack progression

B.

Losses incurred by industry peers

C.

Most recent antivirus scan reports

D.

Potential impact of events

Full Access
Question # 310

An IT risk practitioner has been tasked to engage key stakeholders to assess risk for key IT risk scenarios. Which of the following is the PRIMARY benefit of this activity?

A.

Establishing the available risk mitigation budget

B.

Verifying the relevance of risk ratings

C.

Demonstrating compliance to regulatory bodies

D.

Assessing IT risk management culture

Full Access
Question # 311

An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?

A.

The third party s management

B.

The organization's management

C.

The control operators at the third party

D.

The organization's vendor management office

Full Access
Question # 312

An organization is reviewing a contract for a Software as a Service (SaaS) sales application with a 99.9% uptime service level agreement (SLA). Which of the following BEST describes ownership of availability risk?

A.

The risk is shared by both organizations.

B.

The liability for the risk is owned by the cloud provider.

C.

The risk is transferred to the cloud provider.

D.

The liability for the risk is owned by the sales department.

Full Access
Go to page: