Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 321

Which of the following is MOST important for a risk practitioner to confirm once a risk action plan has been completed?

A.

The risk register has been updated.

B.

The risk tolerance has been recalibrated.

C.

The risk has been mitigated to the intended level.

D.

The risk owner has reviewed the outcomes.

Full Access
Question # 322

Which of the following is the PRIMARY reason to ensure software engineers test patches before release to the production environment?

A.

To detect incompatibilities that might disrupt the operation

B.

To provide assurance that deployed patches have been properly authorized

C.

To understand how long it will take to deploy the patch

D.

To support availability by authorizing the release of the patch at the appropriate time

Full Access
Question # 323

A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

A.

IT infrastructure manager

B.

Chief Risk Officer (CRO)

C.

Business continuity manager

D.

Business application owner

Full Access
Question # 324

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 325

Calculation of the recovery time objective (RTO) is necessary to determine the:

A.

time required to restore files.

B.

point of synchronization

C.

priority of restoration.

D.

annual loss expectancy (ALE).

Full Access
Question # 326

Which of the following is the MOST important input when developing risk scenarios?

A.

Key performance indicators

B.

Business objectives

C.

The organization's risk framework

D.

Risk appetite

Full Access
Question # 327

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Full Access
Question # 328

Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?

A.

Some IT risk scenarios have multi-year risk action plans.

B.

Several IT risk scenarios are missing assigned owners.

C.

Numerous IT risk scenarios have been granted risk acceptances.

D.

Many IT risk scenarios are categorized as avoided.

Full Access
Go to page: