Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 321

A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?

A.

Customer database manager

B.

Customer data custodian

C.

Data privacy officer

D.

Audit committee

Full Access
Question # 322

A change management process has recently been updated with new testing procedures. What is the NEXT course of action?

A.

Monitor processes to ensure recent updates are being followed.

B.

Communicate to those who test and promote changes.

C.

Conduct a cost-benefit analysis to justify the cost of the control.

D.

Assess the maturity of the change management process.

Full Access
Question # 323

An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the countrywhere it is collected. Which of the following should be done FIRST when addressing this situation?

A.

Analyze data protection methods.

B.

Understand data flows.

C.

Include a right-to-audit clause.

D.

Implement strong access controls.

Full Access
Question # 324

Which of the following will BEST support management reporting on risk?

A.

Control self-assessment (CSA)

B.

Risk policy requirements

C.

A risk register

D.

Key performance indicators (KPIs)

Full Access
Question # 325

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?

A.

Network monitoring infrastructure

B.

Centralized vulnerability management

C.

Incident management process

D.

Centralized log management

Full Access
Question # 326

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

A.

Identifying critical information assets

B.

Identifying events impacting continuity of operations.

C.

Creating a data classification scheme

D.

Analyzing previous risk assessment results

Full Access
Question # 327

An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?

A.

The number of users who can access sensitive data

B.

A list of unencrypted databases which contain sensitive data

C.

The reason some databases have not been encrypted

D.

The cost required to enforce encryption

Full Access
Question # 328

When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?

A.

a identity conditions that may cause disruptions

B.

Review incident response procedures

C.

Evaluate the probability of risk events

D.

Define metrics for restoring availability

Full Access
Go to page: