Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 17

Within the system development life cycle (SDLC), controls should be specified during:

A.

project initiation

B.

business case development.

C.

system integration testing.

D.

requirements definition.

Full Access
Question # 18

Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?

A.

Updating the risk register to include the risk mitigation plan

B.

Determining processes for monitoring the effectiveness of the controls

C.

Ensuring that control design reduces risk to an acceptable level

D.

Confirming to management the controls reduce the likelihood of the risk

Full Access
Question # 19

Which of the following is the BEST indication that an organization ' s IT asset life cycle is poorly managed?

A.

Increased hardware maintenance costs

B.

Sensitive data found on discarded devices

C.

Lack of asset labeling

D.

Inadequate employee training

Full Access
Question # 20

An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?

A.

The service provider

B.

Vendor risk manager

C.

Legal counsel

D.

Business process owner

Full Access
Question # 21

A user has contacted the risk practitioner regarding malware spreading laterally across the organization ' s corporate network. Which of the following is the risk practitioner’s BEST course of action?

A.

Review all log files generated during the period of malicious activity.

B.

Perform a root cause analysis.

C.

Notify the cybersecurity incident response team.

D.

Update the risk register.

Full Access
Question # 22

Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?

A.

Establish baseline security configurations with the cloud service provider.

B.

Require the cloud prowler 10 disclose past data privacy breaches.

C.

Ensure the cloud service provider performs an annual risk assessment.

D.

Specify cloud service provider liability for data privacy breaches in the contract

Full Access
Question # 23

What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?

A.

Mitigation and control value

B.

Volume and scope of data generated daily

C.

Business criticality and sensitivity

D.

Recovery point objective (RPO) and recovery time objective (RTO)

Full Access
Question # 24

A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?

A.

Single sign-on

B.

Audit trail review

C.

Multi-factor authentication

D.

Data encryption at rest

Full Access
Go to page: