Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 393

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

A.

plan awareness programs for business managers.

B.

evaluate maturity of the risk management process.

C.

assist in the development of a risk profile.

D.

maintain a risk register based on noncompliance.

Full Access
Question # 394

The FIRST step for a startup company when developing a disaster recovery plan (DRP) should be to identify:

A.

Current vulnerabilities

B.

Recovery time objectives (RTOs)

C.

Critical business processes

D.

A suitable alternate site

Full Access
Question # 395

Which of the following is MOST important to consider when selecting and designing key control indicators (KCIs)?

A.

The KCI can establish a formal correlation with relevant KRIs

B.

The KCI can demonstrate whether the control objective has been met

C.

The KCI can be implemented within the allocated budget

D.

The KCI can be measured using quantitative methods

Full Access
Question # 396

An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?

A.

The third party ' s IT operations manager

B.

The organization ' s process owner

C.

The third party ' s chief risk officer (CRO)

D.

The organization ' s risk practitioner

Full Access
Question # 397

Which type of indicators should be developed to measure the effectiveness of an organization ' s firewall rule set?

A.

Key risk indicators (KRIs)

B.

Key management indicators (KMIs)

C.

Key performance indicators (KPIs)

D.

Key control indicators (KCIs)

Full Access
Question # 398

How should an organization approach the retention of data that is no longer needed for business operations?

A.

Data should be retained for a reasonable period of time in case of system rollback.

B.

Data should be destroyed or retained on the basis of a cost-benefit analysis.

C.

Data should be retained based on regulatory requirements.

D.

Data should be destroyed to avoid any risk exposure.

Full Access
Question # 399

A new regulator/ requirement imposes severe fines for data leakage involving customers ' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?

A.

Reduce retention periods for Pll data.

B.

Move Pll to a highly-secured outsourced site.

C.

Modify business processes to stop collecting Pll.

D.

Implement strong encryption for Pll.

Full Access
Question # 400

Which of the following would MOST effectively protect financial records from ransomware attacks?

A.

Enforcement of encryption at rest for backups

B.

Multi-factor authentication (MFA) on storage points

C.

Classifying and encrypting data on backups

D.

Immutable storage and backups

Full Access
Go to page: