Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 33

Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?

A.

Automated access revocation

B.

Daily transaction reconciliation

C.

Rule-based data analytics

D.

Role-based user access model

Full Access
Question # 34

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

A.

increased inherent risk.

B.

higher risk management cost

C.

decreased residual risk.

D.

lower risk management cost.

Full Access
Question # 35

Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?

A.

A reduction in the number of help desk calls

B.

An increase in the number of identified system flaws

C.

A reduction in the number of user access resets

D.

An increase in the number of incidents reported

Full Access
Question # 36

Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?

A.

Data encryption has not been applied to all sensitive data across the organization.

B.

There are many data assets across the organization that need to be classified.

C.

Changes to information handling procedures are not documented.

D.

Changes to data sensitivity during the data life cycle have not been considered.

Full Access
Question # 37

Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?

A.

Business impact assessment (BIA)

B.

Key performance indicators (KPIs)

C.

Risk profile

D.

Industry benchmark analysis

Full Access
Question # 38

An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:

A.

a lack of mitigating actions for identified risk

B.

decreased threat levels

C.

ineffective service delivery

D.

ineffective IT governance

Full Access
Question # 39

Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?

A.

Implement user access controls

B.

Perform regular internal audits

C.

Develop and communicate fraud prevention policies

D.

Conduct fraud prevention awareness training.

Full Access
Question # 40

Which of the following cloud service models is MOST appropriate for client organizations that want to maximize their control over management of the data life cycle?

A.

Data as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Full Access
Go to page: