Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 449

When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?

A.

Emphasize individual responsibility for managing risk.

B.

Communicate incident escalation procedures.

C.

Illustrate methods to identify threats and vulnerabilities.

D.

Challenge the effectiveness of business processes.

Full Access
Question # 450

Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?

A.

Hosted data

B.

Platforms

C.

Containers

D.

Security logs

Full Access
Question # 451

To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:

A.

risk mitigation approach

B.

cost-benefit analysis.

C.

risk assessment results.

D.

vulnerability assessment results

Full Access
Question # 452

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.

Insurance coverage

B.

Security awareness training

C.

Policies and standards

D.

Risk appetite and tolerance

Full Access
Question # 453

An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

A.

Data controllers

B.

Data processors

C.

Data custodians

D.

Data owners

Full Access
Question # 454

Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?

A.

Ensuring availability of resources for log analysis

B.

Implementing log analysis tools to automate controls

C.

Ensuring the control is proportional to the risk

D.

Building correlations between logs collected from different sources

Full Access
Question # 455

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.

Risk likelihood

B.

Inherent risk

C.

Risk appetite

D.

Risk tolerance

Full Access
Question # 456

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

A.

Sharing company information on social media

B.

Sharing personal information on social media

C.

Using social media to maintain contact with business associates

D.

Using social media for personal purposes during working hours

Full Access
Go to page: