Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 393

An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:

A.

procedures to monitor the operation of controls.

B.

a tool for monitoring critical activities and controls.

C.

real-time monitoring of risk events and control exceptions.

D.

monitoring activities for all critical assets.

E.

Perform a controls assessment.

Full Access
Question # 394

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

A.

The difference In the management practices between each company

B.

The cloud computing environment is shared with another company

C.

The lack of a service level agreement (SLA) in the vendor contract

D.

The organizational culture differences between each country

Full Access
Question # 395

Which types of controls are BEST used to minimize the risk associated with a vulnerability?

A.

Detective

B.

Preventive

C.

Deterrent

D.

Directive

Full Access
Question # 396

Risk mitigation procedures should include:

A.

buying an insurance policy.

B.

acceptance of exposures

C.

deployment of counter measures.

D.

enterprise architecture implementation.

Full Access
Question # 397

After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:

Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?

A.

External audit

B.

Internal audit

C.

Vendor performance scorecard

D.

Regulatory examination

Full Access
Question # 398

During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?

A.

Schedule periodic reviews of the compensating controls' effectiveness.

B.

Report the use of compensating controls to senior management.

C.

Recommend additional IT controls to further reduce residual risk.

D.

Request that ownership of the compensating controls is reassigned to IT

Full Access
Question # 399

Which of the following is a specific concern related to machine learning algorithms?

A.

Low software quality

B.

Lack of access controls

C.

Data breaches

D.

Data bias

Full Access
Question # 400

Which of the following is the GREATEST concern associated with the lack of proper control monitoring?

A.

There is potential for an increase in audit findings

B.

Key performance indicators (KPIs) may not be reliable

C.

The potential for risk realization is increased

D.

Control inefficiencies may go undetected

Full Access
Go to page: