Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 449

A new international data privacy regulation requires personal data to be

disposed after the specified retention period, which is different from the local

regulatory requirement. Which of the following is the risk practitioner's

BEST course of action?

A.

The application code has not been version controlled.

B.

Knowledge of the applications is limited to few employees.

C.

An IT project manager is not assigned to oversee development.

D.

Controls are not applied to the applications.

Full Access
Question # 450

Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?

A.

Risk magnitude

B.

Incident probability

C.

Risk appetite

D.

Cost-benefit analysis

Full Access
Question # 451

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

A.

Absorb the loss in productivity.

B.

Request a waiver to the requirements.

C.

Escalate the issue to senior management

D.

Remove the control to accommodate business objectives.

Full Access
Question # 452

Which of the following is the MAIN purpose of monitoring risk?

A.

Communication

B.

Risk analysis

C.

Decision support

D.

Benchmarking

Full Access
Question # 453

An organization is considering adopting artificial intelligence (AI). Which of the

following is the risk practitioner's MOST important course of action?

A.

Develop key risk indicators (KRIs).

B.

Ensure sufficient pre-implementation testing.

C.

Identify applicable risk scenarios.

D.

Identify the organization's critical data.

Full Access
Question # 454

Which of the following is a risk practitioner's BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?

A.

Rate the risk as high priority based on the severe impact.

B.

Obtain management's consent to accept the risk.

C.

Ignore the risk due to the extremely low likelihood.

D.

Address the risk by analyzing treatment options.

Full Access
Question # 455

Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?

A.

Published vulnerabilities relevant to the business

B.

Threat actors that can trigger events

C.

Events that could potentially impact the business

D.

IT assets requiring the greatest investment

Full Access
Question # 456

An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?

A.

The third party s management

B.

The organization's management

C.

The control operators at the third party

D.

The organization's vendor management office

Full Access
Go to page: