Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 337

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

A.

Performing a benchmark analysis and evaluating gaps

B.

Conducting risk assessments and implementing controls

C.

Communicating components of risk and their acceptable levels

D.

Participating in peer reviews and implementing best practices

Full Access
Question # 338

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization ' s risk appetite?

A.

Establishing a series of key risk indicators (KRIs).

B.

Adding risk triggers to entries in the risk register.

C.

Implementing key performance indicators (KPIs).

D.

Developing contingency plans for key processes.

Full Access
Question # 339

Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?

A.

Performing credit verification of third-party vendors prior to payment

B.

Conducting system access reviews to ensure least privilege and appropriate access

C.

Performing regular reconciliation of payments to the check registers

D.

Enforcing segregation of duties between the vendor master file and invoicing

Full Access
Question # 340

An organization ' s stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

A.

Escalate to senior management.

B.

Identify a risk transfer option.

C.

Reassess risk scenarios.

D.

Benchmark with similar industries.

Full Access
Question # 341

Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?

A.

It facilitates the use of a framework for risk management.

B.

It establishes a means for senior management to formally approve risk practices.

C.

It encourages risk-based decision making for stakeholders.

D.

It provides a basis for benchmarking against industry standards.

Full Access
Question # 342

An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner ' s FIRST step to address this situation?

A.

Recommend additional controls to address the risk.

B.

Update the risk tolerance level to acceptable thresholds.

C.

Update the incident-related risk trend in the risk register.

D.

Recommend a root cause analysis of the incidents.

Full Access
Question # 343

A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization ' s applications. Which of the following MUST be aligned with the maximum allowable outage?

A.

Mean time to restore (MTTR)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to detect (MTTD)

Full Access
Question # 344

Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?

A.

To monitor changes in the risk environment

B.

To provide input to management for the adjustment of risk appetite

C.

To monitor the accuracy of threshold levels in metrics

D.

To obtain business buy-in for investment in risk mitigation measures

Full Access
Go to page: