Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 81

During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?

A.

Conduct a comprehensive review of access management processes.

B.

Declare a security incident and engage the incident response team.

C.

Conduct a comprehensive awareness session for system administrators.

D.

Evaluate system administrators' technical skills to identify if training is required.

Full Access
Question # 82

Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?

A.

Tokenized personal data only in test environments

B.

Data loss prevention tools (DLP) installed in passive mode

C.

Anonymized personal data in non-production environments

D.

Multi-factor authentication for access to non-production environments

Full Access
Question # 83

An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?

A.

Map the granular risk scenarios to the high-level risk register items.

B.

List application and server vulnerabilities in the IT risk register.

C.

Identify overlapping risk scenarios between the two registers.

D.

Maintain both high-level and granular risk scenarios in a single register.

Full Access
Question # 84

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

A.

To identify threats introduced by business processes

B.

To identify risk when personal information is collected

C.

To ensure senior management has approved the use of personal information

D.

To ensure compliance with data privacy laws and regulations

Full Access
Question # 85

Which of the following groups represents the first line of defense?

A.

Internal audit

B.

Compliance committee

C.

External audit

D.

Operational managers

Full Access
Question # 86

Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?

A.

It may be expensive to maintain a data lake.

B.

It may be difficult to find experts who can develop analytical queries.

C.

There may be a lack of documented processes for big data analysis.

D.

Analytics methods may identify someone who was previously de-identified.

Full Access
Question # 87

Which of the following is the MOST important reason to report on changes or trends related to an organization's IT risk profile?

A.

To benchmark against a risk management framework

B.

To predict external regulatory changes

C.

To adapt to emerging threats

D.

To reduce the cost of performing control activities

Full Access
Question # 88

Which of the following is the MOST effective way lo ensure professional ethics are maintained as a core organizational value and adhered to by employees?

A.

Include professional ethics in the corporate value statement.

B.

Establish a channel for employees to report unethical behavior.

C.

Include professional ethics criteria as part of performance appraisals.

D.

Establish a code of conduct document for employees to sign.

Full Access
Go to page: