Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 409

An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?

A.

Perform a risk assessment

B.

Disable user access.

C.

Develop an access control policy.

D.

Perform root cause analysis.

Full Access
Question # 410

An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.

A.

The risk owner who also owns the business service enabled by this infrastructure

B.

The data center manager who is also employed under the managed hosting services contract

C.

The site manager who is required to provide annual risk assessments under the contract

D.

The chief information officer (CIO) who is responsible for the hosted services

Full Access
Question # 411

Which of the following is MOST important to identify when developing generic risk scenarios?

A.

The organization’s vision and mission

B.

Resources required for risk mitigation

C.

Impact to business objectives

D.

Risk-related trends within the industry

Full Access
Question # 412

Which of the following is the BEST method to identify unnecessary controls?

A.

Evaluating the impact of removing existing controls

B.

Evaluating existing controls against audit requirements

C.

Reviewing system functionalities associated with business processes

D.

Monitoring existing key risk indicators (KRIs)

Full Access
Question # 413

Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?

A.

A robust risk aggregation tool set

B.

Clearly defined roles and responsibilities

C.

A well-established risk management committee

D.

Well-documented and communicated escalation procedures

Full Access
Question # 414

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Full Access
Question # 415

Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?

A.

Closed management action plans from the previous audit

B.

Annual risk assessment results

C.

An updated vulnerability management report

D.

A list of identified generic risk scenarios

Full Access
Question # 416

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Full Access
Go to page: