Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 529

Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?

A.

Number of active nodes

B.

Blockchain size in gigabytes

C.

Average transaction speed

D.

Number of validated transactions

Full Access
Question # 530

Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?

A.

Key audit findings

B.

Treatment plan status

C.

Performance indicators

D.

Risk scenario results

Full Access
Question # 531

Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?

A.

Number of days taken to remove access after staff separation dates

B.

Number of days taken for IT to remove access after receipt of HR instructions

C.

Number of termination requests processed per reporting period

D.

Number of days taken for HR to provide instructions to IT after staff separation dates

Full Access
Question # 532

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

A.

introduced into production without high-risk issues.

B.

having the risk register updated regularly.

C.

having key risk indicators (KRIs) established to measure risk.

D.

having an action plan to remediate overdue issues.

Full Access
Question # 533

A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?

A.

Protect sensitive information with access controls.

B.

Implement a data loss prevention (DLP) solution.

C.

Re-communicate the data protection policy.

D.

Implement a data encryption solution.

Full Access
Question # 534

Which of the following would MOST likely cause management to unknowingly accept excessive risk?

A.

Satisfactory audit results

B.

Risk tolerance being set too low

C.

Inaccurate risk ratings

D.

Lack of preventive controls

Full Access
Question # 535

Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?

A.

Emphasizing risk in the risk profile that is related to critical business activities

B.

Customizing the presentation of the risk profile to the intended audience

C.

Including details of risk with high deviation from the risk appetite

D.

Providing information on the efficiency of controls for risk mitigation

Full Access
Question # 536

An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?

A.

Number of claims affected by the user requirements

B.

Number of customers impacted

C.

Impact to the accuracy of claim calculation

D.

Level of resources required to implement the user requirements

Full Access
Go to page: