Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 49

Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?

A.

Data classification policy

B.

Emerging technology trends

C.

The IT strategic plan

D.

The risk register

Full Access
Question # 50

Which of the following is a detective control?

A.

Limit check

B.

Periodic access review

C.

Access control software

D.

Rerun procedures

Full Access
Question # 51

Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?

A.

A technology review and approval process

B.

An acceptable use policy

C.

An automated network scanning solution

D.

A bring your own device (BYOD) policy

Full Access
Question # 52

Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?

A.

Segregation of duties

B.

Monetary approval limits

C.

Clear roles and responsibilities

D.

Password policies

Full Access
Question # 53

Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?

A.

Risk policy review

B.

Business impact analysis (B1A)

C.

Control catalog

D.

Risk register

Full Access
Question # 54

Which of the following will BEST mitigate the risk associated with IT and business misalignment?

A.

Establishing business key performance indicators (KPIs)

B.

Introducing an established framework for IT architecture

C.

Establishing key risk indicators (KRIs)

D.

Involving the business process owner in IT strategy

Full Access
Question # 55

Which of the following is the MOST important input when developing risk scenarios?

A.

Key performance indicators

B.

Business objectives

C.

The organization's risk framework

D.

Risk appetite

Full Access
Question # 56

Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?

A.

To define effective enterprise IT risk appetite and tolerance levels

B.

To execute the IT risk management strategy in support of business objectives

C.

To establish business-aligned IT risk management organizational structures

D.

To assess the capabilities and maturity of the organization’s IT risk management efforts

Full Access
Go to page: