Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 385

A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?

A.

Reviewing access control lists

B.

Authorizing user access requests

C.

Performing user access recertification

D.

Terminating inactive user access

Full Access
Question # 386

Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?

A.

Service level agreement (SLA)

B.

Critical success factor (CSF)

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

Full Access
Question # 387

A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?

A.

Assessing the degree to which the control hinders business objectives

B.

Reviewing the IT policy with the risk owner

C.

Reviewing the roles and responsibilities of control process owners

D.

Assessing noncompliance with control best practices

Full Access
Question # 388

Which of the following will BEST help to ensure implementation of corrective action plans?

A.

Contracting to third parties

B.

Establishing employee awareness training

C.

Setting target dates to complete actions

D.

Assigning accountability to risk owners

Full Access
Question # 389

IT disaster recovery point objectives (RPOs) should be based on the:

A.

maximum tolerable downtime.

B.

maximum tolerable loss of data.

C.

need of each business unit.

D.

type of business.

Full Access
Question # 390

Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?

A.

Reject the risk acceptance and require mitigating controls.

B.

Monitor the residual risk level of the accepted risk.

C.

Escalate the risk decision to the project sponsor for review.

D.

Document the risk decision in the project risk register.

Full Access
Question # 391

Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk

awareness program?

A.

Policies and procedures

B.

Structure and culture

C.

Key risk indicators (KRIs) and thresholds

D.

Known threats and vulnerabilities

Full Access
Question # 392

Which of the following is the MOST appropriate key control indicator (KCI) to help an organization prevent successful cyber risk events on the external-facing infrastructure?

A.

Increasing number of threat actors

B.

Increasing number of intrusion detection system (IDS) false positive alerts

C.

Increasing percentage of unpatched demilitarized zone (DMZ) servers

D.

Increasing trend of perimeter attacks

Full Access
Go to page: