Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 81

Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?

A.

Requiring a printer access code for each user

B.

Using physical controls to access the printer room

C.

Using video surveillance in the printer room

D.

Ensuring printer parameters are properly configured

Full Access
Question # 82

Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?

A.

Change testing schedule

B.

Impact assessment of the change

C.

Change communication plan

D.

User acceptance testing (UAT)

Full Access
Question # 83

Which of the following is the BEST source for identifying key control indicators (KCIs)?

A.

Privileged user activity monitoring controls

B.

Controls mapped to organizational risk scenarios

C.

Recent audit findings of control weaknesses

D.

A list of critical security processes

Full Access
Question # 84

What would be the MAIN concern associated with a decentralized IT function maintaining multiple risk registers?

A.

Risk treatment efforts within the IT function may overlap one another.

B.

Duplicate IT risk scenarios may be documented across the organization.

C.

Aggregate risk within the IT function may exceed the organization ' s appetite.

D.

Related IT risk scenarios in the IT function may be updated at different times.

Full Access
Question # 85

The MOST important consideration when selecting a control to mitigate an identified risk is whether:

A.

the cost of control exceeds the mitigation value

B.

there are sufficient internal resources to implement the control

C.

the mitigation measures create compounding effects

D.

the control eliminates the risk

Full Access
Question # 86

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Implementing a data toss prevention (DLP) solution

B.

Assigning a data owner

C.

Scheduling periodic audits

D.

Implementing technical controls over the assets

Full Access
Question # 87

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

A.

To support regulatory requirements

B.

To prevent the risk scenario in the current environment

C.

To monitor for potential changes to the risk scenario

D.

To track historical risk assessment results

Full Access
Question # 88

Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

A.

To provide input to the organization ' s risk appetite

B.

To monitor the vendor ' s control effectiveness

C.

To verify the vendor ' s ongoing financial viability

D.

To assess the vendor ' s risk mitigation plans

Full Access
Go to page: