Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 49

As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?

A.

An assessment of threats to the organization

B.

An assessment of recovery scenarios

C.

industry standard framework

D.

Documentation of testing procedures

Full Access
Question # 50

Which of the following has the GREATEST influence on an organization's risk appetite?

A.

Threats and vulnerabilities

B.

Internal and external risk factors

C.

Business objectives and strategies

D.

Management culture and behavior

Full Access
Question # 51

Which of the following would BEST mitigate an identified risk scenario?

A.

Conducting awareness training

B.

Executing a risk response plan

C.

Establishing an organization's risk tolerance

D.

Performing periodic audits

Full Access
Question # 52

Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Updating the organizational policy for remote access

B.

Creating metrics to track remote connections

C.

Implementing multi-factor authentication

D.

Updating remote desktop software

Full Access
Question # 53

Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?

A.

Fiscal management practices

B.

Business maturity

C.

Budget for implementing security

D.

Management culture

Full Access
Question # 54

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

A.

Code review

B.

Penetration test

C.

Gap assessment

D.

Business impact analysis (BIA)

Full Access
Question # 55

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

A.

Do not collect or retain data that is not needed.

B.

Redact data where possible.

C.

Limit access to the personal data.

D.

Ensure all data is encrypted at rest and during transit.

Full Access
Question # 56

During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?

A.

Escalate the non-cooperation to management

B.

Exclude applicable controls from the assessment.

C.

Review the supplier's contractual obligations.

D.

Request risk acceptance from the business process owner.

Full Access
Go to page: