Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 25

The MOST effective approach to prioritize risk scenarios is by:

A.

assessing impact to the strategic plan.

B.

aligning with industry best practices.

C.

soliciting input from risk management experts.

D.

evaluating the cost of risk response.

Full Access
Question # 26

After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:

A.

record risk scenarios in the risk register for analysis.

B.

validate the risk scenarios for business applicability.

C.

reduce the number of risk scenarios to a manageable set.

D.

perform a risk analysis on the risk scenarios.

Full Access
Question # 27

A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?

A.

invoke the established incident response plan.

B.

Inform internal audit.

C.

Perform a root cause analysis

D.

Conduct an immediate risk assessment

Full Access
Question # 28

Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?

A.

Data storage and collection methods

B.

Data owner preferences

C.

Legal and regulatory requirements

D.

Choice of encryption algorithms

Full Access
Question # 29

Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?

A.

The number of stakeholders involved in IT risk identification workshops

B.

The percentage of corporate budget allocated to IT risk activities

C.

The percentage of incidents presented to the board

D.

The number of executives attending IT security awareness training

Full Access
Question # 30

An IT risk threat analysis is BEST used to establish

A.

risk scenarios

B.

risk maps

C.

risk appetite

D.

risk ownership.

Full Access
Question # 31

Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?

A.

Physical destruction

B.

Degaussing

C.

Data anonymization

D.

Data deletion

Full Access
Question # 32

To enable effective risk governance, it is MOST important for senior management to:

A.

Ensure the IT governance framework is up to date.

B.

Communicate the risk management strategy across the organization.

C.

Gain a clear understanding of business risk and related ownership.

D.

Ensure security policies and procedures are documented.

Full Access
Go to page: