Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 497

An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been;

A.

mitigated

B.

deferred

C.

accepted.

D.

transferred

Full Access
Question # 498

Which of the following provides the BEST assurance of the effectiveness of vendor security controls?

A.

Review vendor control self-assessments (CSA).

B.

Review vendor service level agreement (SLA) metrics.

C.

Require independent control assessments.

D.

Obtain vendor references from existing customers.

Full Access
Question # 499

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

A.

The risk practitioner

B.

The risk owner

C.

The control owner

D.

The audit manager

Full Access
Question # 500

What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?

A.

Potential loss to tie business due to non-performance of the asset

B.

Known emerging environmental threats

C.

Known vulnerabilities published by the asset developer

D.

Cost of replacing the asset with a new asset providing similar services

Full Access
Question # 501

Whose risk tolerance matters MOST when making a risk decision?

A.

Customers who would be affected by a breach

B.

Auditors, regulators and standards organizations

C.

The business process owner of the exposed assets

D.

The information security manager

Full Access
Question # 502

Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?

A.

IT security manager

B.

IT personnel

C.

Data custodian

D.

Data owner

Full Access
Question # 503

Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?

A.

An acceptable use policy for personal devices

B.

Required user log-on before synchronizing data

C.

Enforced authentication and data encryption

D.

Security awareness training and testing

Full Access
Question # 504

Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?

A.

An annual contract review

B.

A service level agreement (SLA)

C.

A requirement to adopt an established risk management framework

D.

A requirement to provide an independent audit report

Full Access
Go to page: