Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 329

Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?

A.

An increase in the number of risk threshold exceptions

B.

An increase in the number of change events pending management review

C.

A decrease in the number of key performance indicators (KPIs)

D.

A decrease in the number of critical assets covered by risk thresholds

Full Access
Question # 330

An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:

A.

Avoidance

B.

Mitigation

C.

Transfer

D.

Acceptance

Full Access
Question # 331

Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?

A.

Detective control

B.

Deterrent control

C.

Preventive control

D.

Corrective control

Full Access
Question # 332

Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?

A.

A high number of approved exceptions exist with compensating controls.

B.

Successive assessments have the same recurring vulnerabilities.

C.

Redundant compensating controls are in place.

D.

Asset custodians are responsible for defining controls instead of asset owners.

Full Access
Question # 333

Which of the following roles should be assigned accountability for monitoring risk levels?

A.

Risk practitioner

B.

Business manager

C.

Risk owner

D.

Control owner

Full Access
Question # 334

During the internal review of an accounts payable process, a risk practitioner determines that the transaction approval limits configured in the system are not being enforced. Which of the following should be done NEXT?

A.

Identify the extent of the approval limit violations.

B.

Notify senior management of the system deficiency.

C.

Update the risk register with higher risk likelihood of violation.

D.

Remind users of the importance of adhering to approval limits.

Full Access
Question # 335

Which of the following is the MOST important reason to create risk scenarios?

A.

To assist with risk identification

B.

To determine risk tolerance

C.

To determine risk appetite

D.

To assist in the development of risk responses

Full Access
Question # 336

Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization's IT systems via personal or public computers?

A.

Risk appetite

B.

Inherent risk

C.

Key risk indicator (KRI)

D.

Risk tolerance

Full Access
Go to page: