Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 417

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

A.

stakeholder risk tolerance.

B.

benchmarking criteria.

C.

suppliers used by the organization.

D.

the control environment.

Full Access
Question # 418

A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?

A.

Correct the vulnerabilities to mitigate potential risk exposure.

B.

Develop a risk response action plan with key stakeholders.

C.

Assess the level of risk associated with the vulnerabilities.

D.

Communicate the vulnerabilities to the risk owner.

Full Access
Question # 419

Which of the following should be the PRIMARY focus of an IT risk awareness program?

A.

Ensure compliance with the organization's internal policies

B.

Cultivate long-term behavioral change.

C.

Communicate IT risk policy to the participants.

D.

Demonstrate regulatory compliance.

Full Access
Question # 420

Which of the following is the MOST appropriate key control indicator (KCI) to help an organization prevent successful cyber risk events on the external-facing infrastructure?

A.

Increasing number of threat actors

B.

Increasing number of intrusion detection system (IDS) false positive alerts

C.

Increasing percentage of unpatched demilitarized zone (DMZ) servers

D.

Increasing trend of perimeter attacks

Full Access
Question # 421

A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?

A.

Impact

B.

Residual risk

C.

Inherent risk

D.

Risk appetite

Full Access
Question # 422

Which of the following provides the BEST evidence that risk responses are effective?

A.

Residual risk is within risk tolerance.

B.

Risk with low impact is accepted.

C.

Risk ownership is identified and assigned.

D.

Compliance breaches are addressed in a timely manner.

Full Access
Question # 423

Which of the following is the BEST way to validate privileged access to database accounts?

A.

Regular reviews of privileged access

B.

Confirmation from users with privileged access

C.

Management approval of access requests

D.

Confirmation from the database administrator (DBA)

Full Access
Question # 424

An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?

A.

Initiate a retest of the full control

B.

Retest the control using the new application as the only sample.

C.

Review the corresponding change control documentation

D.

Re-evaluate the control during (he next assessment

Full Access
Go to page: