Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 417

Which of the following is the BEST course of action to reduce risk impact?

A.

Create an IT security policy.

B.

Implement corrective measures.

C.

Implement detective controls.

D.

Leverage existing technology

Full Access
Question # 418

The PRIMARY reason for a risk practitioner to review business processes is to:

A.

Benchmark against peer organizations.

B.

Identify appropriate controls within business processes.

C.

Assess compliance with global standards.

D.

Identify risk owners related to business processes.

Full Access
Question # 419

Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?

A.

Maintain and review the classified data inventor.

B.

Implement mandatory encryption on data

C.

Conduct an awareness program for data owners and users.

D.

Define and implement a data classification policy

Full Access
Question # 420

A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?

A.

Risk assessment

B.

Risk reporting

C.

Risk mitigation

D.

Risk identification

Full Access
Question # 421

Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?

A.

Percentage of systems included in recovery processes

B.

Number of key systems hosted

C.

Average response time to resolve system incidents

D.

Percentage of system availability

Full Access
Question # 422

An organization wants to assess the maturity of its internal control environment. The FIRST step should be to:

A.

validate control process execution.

B.

determine if controls are effective.

C.

identify key process owners.

D.

conduct a baseline assessment.

Full Access
Question # 423

Which of the following controls will BEST detect unauthorized modification of data by a database administrator?

A.

Reviewing database access rights

B.

Reviewing database activity logs

C.

Comparing data to input records

D.

Reviewing changes to edit checks

Full Access
Question # 424

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Full Access
Go to page: