Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 505

An organization's HR department has implemented a policy requiring staff members to take a minimum of five consecutive days leave per year to mitigate the risk of malicious insideractivities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?

A.

Number of malicious activities occurring during staff members leave

B.

Percentage of staff members seeking exception to the policy

C.

Percentage of staff members taking leave according to the policy

D.

Financial loss incurred due to malicious activities during staff members' leave

Full Access
Question # 506

A MAJOR advantage of using key risk indicators (KRIs) is that they:

A.

Identify scenarios that exceed defined risk appetite.

B.

Help with internal control assessments concerning risk appetite.

C.

Assess risk scenarios that exceed defined thresholds.

D.

Identify when risk exceeds defined thresholds.

Full Access
Question # 507

An organization's capability to implement a risk management framework is PRIMARILY influenced by the:

A.

guidance of the risk practitioner.

B.

competence of the staff involved.

C.

approval of senior management.

D.

maturity of its risk culture.

Full Access
Question # 508

Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?

A.

Manage cyber risk according to the organization's risk management framework.

B.

Define cyber roles and responsibilities across the organization

C.

Conduct cyber risk awareness training tailored specifically for senior management

D.

Implement a cyber risk program based on industry best practices

Full Access
Question # 509

What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?

A.

Review regular control testing results.

B.

Recommend a penetration test.

C.

Assess the risk to determine mitigation needed.

D.

Analyze key performance indicators (KPIs).

Full Access
Question # 510

Which of the following BEST enables risk mitigation associated with software licensing noncompliance?

A.

Document IT inventory management procedures.

B.

Conduct annual reviews of license expiration dates.

C.

Perform automated vulnerability scans.

D.

Implement automated IT asset management controls.

Full Access
Question # 511

A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?

A.

Preventive

B.

Detective

C.

Directive

D.

Deterrent

Full Access
Question # 512
A.

Risk tolerance

B.

Risk velocity

C.

Risk appetite

D.

Risk capacity

Full Access
Go to page: