Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 273

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Full Access
Question # 274

An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?

A.

Security control owners based on control failures

B.

Cyber risk remediation plan owners

C.

Risk owners based on risk impact

D.

Enterprise risk management (ERM) team

Full Access
Question # 275

An organization's control environment is MOST effective when:

A.

controls perform as intended.

B.

controls operate efficiently.

C.

controls are implemented consistent

D.

control designs are reviewed periodically

Full Access
Question # 276

Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?

A.

Configuration validation

B.

Control attestation

C.

Penetration testing

D.

Internal audit review

Full Access
Question # 277

Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:

A.

communicate risk trends to stakeholders.

B.

assign ownership of emerging risk scenarios.

C.

highlight noncompliance with the risk policy

D.

identify threats to emerging technologies.

Full Access
Question # 278

Reviewing which of the following BEST helps an organization gam insight into its overall risk profile''

A.

Risk register

B.

Risk appetite

C.

Threat landscape

D.

Risk metrics

Full Access
Question # 279

Which of the following is MOST important for maintaining the effectiveness of an IT risk register?

A.

Removing entries from the register after the risk has been treated

B.

Recording and tracking the status of risk response plans within the register

C.

Communicating the register to key stakeholders

D.

Performing regular reviews and updates to the register

Full Access
Question # 280

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

A.

Collecting data for IT risk assessment

B.

Establishing and communicating the IT risk profile

C.

Utilizing a balanced scorecard

D.

Performing and publishing an IT risk analysis

Full Access
Go to page: