Halloween Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 233

Which of the following is the BEST metric to measure employee adherence to organizational security policies?

A.

Total number of security policy audit findings

B.

Total number of regulatory violations

C.

Total number of security policy exceptions

D.

Total number of opened phishing emails

Full Access
Question # 234

A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?

A.

The user requirements were not documented.

B.

Payroll files were not under the control of a librarian.

C.

The programmer had access to the production programs.

D.

The programmer did not involve the user in testing.

Full Access
Question # 235

A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?

A.

Key control indicator (KCI)

B.

Key risk indicator (KRI)

C.

Operational level agreement (OLA)

D.

Service level agreement (SLA)

Full Access
Question # 236

An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?

A.

Reduced ability to evaluate key risk indicators (KRIs)

B.

Reduced access to internal audit reports

C.

Dependency on the vendor's key performance indicators (KPIs)

D.

Dependency on service level agreements (SLAs)

Full Access
Question # 237

An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?

A.

Implementing an emergency change authorization process

B.

Periodically reviewing operator logs

C.

Limiting the number of super users

D.

Reviewing the programmers' emergency change reports

Full Access
Question # 238

Which of the following is the BEST approach to resolve a disagreement between stakeholders regarding the impact of a potential risk scenario?

A.

Modify the risk scenario to address stakeholder concerns.

B.

Calculate the historical impact of risk occurring at industry peers.

C.

Identify data that could be used to help quantify the risk.

D.

Use the highest value of potential impact suggested by the stakeholders.

Full Access
Question # 239

To help ensure the success of a major IT project, it is MOST important to:

A.

obtain the appropriate stakeholders' commitment.

B.

align the project with the IT risk framework.

C.

obtain approval from business process owners.

D.

update the risk register on a regular basis.

Full Access
Question # 240

A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:

A.

validating whether critical IT risk has been addressed.

B.

assigning accountability for IT risk to business functions.

C.

identifying IT assets that support key business processes.

D.

defining the requirements for an IT risk-aware culture

Full Access
Go to page: