Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 329

Which of the following statements in an organization's current risk profile report is cause for further action by senior management?

A.

Key performance indicator (KPI) trend data is incomplete.

B.

New key risk indicators (KRIs) have been established.

C.

Key performance indicators (KPIs) are outside of targets.

D.

Key risk indicators (KRIs) are lagging.

Full Access
Question # 330

A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:

A.

ensure suitable insurance coverage is purchased.

B.

negotiate with the risk owner on control efficiency.

C.

reassess the risk to confirm the impact.

D.

obtain approval from senior management.

Full Access
Question # 331

An IT risk threat analysis is BEST used to establish

A.

risk scenarios

B.

risk maps

C.

risk appetite

D.

risk ownership.

Full Access
Question # 332

When prioritizing risk response, management should FIRST:

A.

evaluate the organization s ability and expertise to implement the solution.

B.

evaluate the risk response of similar organizations.

C.

address high risk factors that have efficient and effective solutions.

D.

determine which risk factors have high remediation costs

Full Access
Question # 333

Which of the following roles is PRIMARILY accountable for risk associated with business information protection?

A.

Control owner

B.

Data owner

C.

System owner

D.

Application owner

Full Access
Question # 334

Which of the following is MOST useful when communicating risk to management?

A.

Risk policy

B.

Audit report

C.

Risk map

D.

Maturity model

Full Access
Question # 335

The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

A.

align with audit results.

B.

benchmark with competitor s actions.

C.

reference best practice.

D.

focus on the business drivers

Full Access
Question # 336

The percentage of unpatched systems is a:

A.

threat vector.

B.

critical success factor (CSF).

C.

key performance indicator (KPI).

D.

key risk indicator (KRI).

Full Access
Go to page: