Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 169

Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?

A.

Single loss expectancy (SLE)

B.

Cost of the information system

C.

Availability of additional compensating controls

D.

Potential business impacts are within acceptable levels

Full Access
Question # 170

After identifying new risk events during a project, the project manager s NEXT step should be to:

A.

determine if the scenarios need 10 be accepted or responded to.

B.

record the scenarios into the risk register.

C.

continue with a qualitative risk analysis.

D.

continue with a quantitative risk analysis.

Full Access
Question # 171

To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?

A.

During the business requirement definitions phase

B.

Before periodic steering committee meetings

C.

At each stage of the development life cycle

D.

During the business case development

Full Access
Question # 172

A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:

A.

update the risk register to reflect the correct level of residual risk.

B.

ensure risk monitoring for the project is initiated.

C.

conduct and document a business impact analysis (BIA).

D.

verify cost-benefit of the new controls being implemented.

Full Access
Question # 173

Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?

A.

The impact of controls on the efficiency of the business in delivering services

B.

Linkage of identified risk scenarios with enterprise risk management

C.

Potential threats and vulnerabilities that may have an impact on the business

D.

Results of network vulnerability scanning and penetration testing

Full Access
Question # 174

When testing the security of an IT system, il is MOST important to ensure that;

A.

tests are conducted after business hours.

B.

operators are unaware of the test.

C.

external experts execute the test.

D.

agreement is obtained from stakeholders.

Full Access
Question # 175

Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?

A.

Review risk tolerance levels

B.

Maintain the current controls.

C.

Analyze the effectiveness of controls.

D.

Execute the risk response plan

Full Access
Question # 176

A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:

A.

obtain management approval for policy exception.

B.

develop an improved password software routine.

C.

select another application with strong password controls.

D.

continue the implementation with no changes.

Full Access
Go to page: