Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 73

Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?

A.

Vulnerability scanning

B.

Continuous monitoring and alerting

C.

Configuration management

D.

Access controls and active logging

Full Access
Question # 74

The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:

A.

rectify errors in results of KRIs.

B.

detect changes in the risk profile.

C.

reduce costs of risk mitigation controls.

D.

continually improve risk assessments.

Full Access
Question # 75

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.

Business resilience manager

B.

Disaster recovery team lead

C.

Application owner

D.

IT operations manager

Full Access
Question # 76

Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Updating the organizational policy for remote access

B.

Creating metrics to track remote connections

C.

Implementing multi-factor authentication

D.

Updating remote desktop software

Full Access
Question # 77

Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?

A.

Software version

B.

Assigned software manager

C.

Software support contract expiration

D.

Software licensing information

Full Access
Question # 78

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?

A.

Monitor the databases for abnormal activity

B.

Approve exception to allow the software to continue operating

C.

Require the software vendor to remediate the vulnerabilities

D.

Accept the risk and let the vendor run the software as is

Full Access
Question # 79

Which of the following is the BEST control to detect an advanced persistent threat (APT)?

A.

Utilizing antivirus systems and firewalls

B.

Conducting regular penetration tests

C.

Monitoring social media activities

D.

Implementing automated log monitoring

Full Access
Question # 80

When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?

A.

BCP testing is net in conjunction with the disaster recovery plan (DRP)

B.

Recovery time objectives (RTOs) do not meet business requirements.

C.

BCP is often tested using the walk-through method.

D.

Each business location has separate, inconsistent BCPs.

Full Access
Go to page: