New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 393

An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on theorganization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?

A.

Obfuscate the customers’ personal information.

B.

Require the business partner to delete personal information following the audit.

C.

Use a secure channel to transmit the files.

D.

Ensure the contract includes provisions for sharing personal information.

Full Access
Question # 394

Which of the following is the FIRST step when developing a business case to drive the adoption of a risk remediation project by senior management?

A.

Calculating the cost

B.

Analyzing cost-effectiveness

C.

Determining the stakeholders

D.

Identifying the objectives

Full Access
Question # 395

Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?

A.

Cost versus benefit of additional mitigating controls

B.

Annualized loss expectancy (ALE) for the system

C.

Frequency of business impact

D.

Cost of the Information control system

Full Access
Question # 396

Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?

A.

Cost-benefit analysis

B.

Penetration testing

C.

Business impact analysis (BIA)

D.

Security assessment

Full Access
Question # 397

What would be the MAIN concern associated with a decentralized IT function maintaining multiple risk registers?

A.

Risk treatment efforts within the IT function may overlap one another.

B.

Duplicate IT risk scenarios may be documented across the organization.

C.

Aggregate risk within the IT function may exceed the organization's appetite.

D.

Related IT risk scenarios in the IT function may be updated at different times.

Full Access
Question # 398

Which of the following is MOST helpful in reducing the likelihood of inaccurate risk assessment results?

A.

Involving relevant stakeholders in the risk assessment process

B.

Updating organizational risk tolerance levels

C.

Reviewing the applicable risk assessment methodologies

D.

Having internal audit validate control effectiveness

Full Access
Question # 399

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

A.

Evaluate current risk management alignment with relevant regulations

B.

Determine if business continuity procedures are reviewed and updated on a regular basis

C.

Conduct a benchmarking exercise against industry peers

D.

Review the methodology used to conduct the business impact analysis (BIA)

Full Access
Question # 400

Which of the following would BEST prevent an unscheduled application of a patch?

A.

Network-based access controls

B.

Compensating controls

C.

Segregation of duties

D.

Change management

Full Access
Go to page: