Weekend Special Sale Limited Time 70% Discount Offer - Ends in 1d 4h 56m 8s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 193

The BEST way to test the operational effectiveness of a data backup procedure is to:

A.

conduct an audit of files stored offsite.

B.

interview employees to compare actual with expected procedures.

C.

inspect a selection of audit trails and backup logs.

D.

demonstrate a successful recovery from backup files.

Full Access
Question # 194

Which of the following MOST effectively limits the impact of a ransomware attack?

A.

Cyber insurance

B.

Cryptocurrency reserve

C.

Data backups

D.

End user training

Full Access
Question # 195

Which of the following is the BEST way to ensure ongoing control effectiveness?

A.

Establishing policies and procedures

B.

Periodically reviewing control design

C.

Measuring trends in control performance

D.

Obtaining management control attestations

Full Access
Question # 196

Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?

A.

Reviewing the organization's policies and procedures

B.

Interviewing groups of key stakeholders

C.

Circulating questionnaires to key internal stakeholders

D.

Accepting IT personnel s view of business issues

Full Access
Question # 197

What is MOST important for the risk practitioner to understand when creating an initial IT risk register?

A.

Enterprise architecture (EA)

B.

Control environment

C.

IT objectives

D.

Organizational objectives

Full Access
Question # 198

The PRIMARY purpose of a maturity model is to compare the:

A.

current state of key processes to their desired state.

B.

actual KPIs with target KPIs.

C.

organization to industry best practices.

D.

organization to peers.

Full Access
Question # 199

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

A.

Risk exposure expressed in business terms

B.

Recommendations for risk response options

C.

Resource requirements for risk responses

D.

List of business areas affected by the risk

Full Access
Question # 200

An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?

A.

Enforce criminal background checks.

B.

Mask customer data fields.

C.

Require vendor to sign a confidentiality agreement.

D.

Restrict access to customer data on a "need to know'' basis.

Full Access
Go to page: