Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 281

Which of the following sources is MOST relevant to reference when updating security awareness training materials?

A.

Risk management framework

B.

Risk register

C.

Global security standards

D.

Recent security incidents reported by competitors

Full Access
Question # 282

Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?

A.

Analyzing cyber intelligence reports

B.

Engaging independent cybersecurity consultants

C.

Increasing the frequency of updates to the risk register

D.

Reviewing the outcome of the latest security risk assessment

Full Access
Question # 283

Which of the following BEST enables effective IT control implementation?

A.

Key risk indicators (KRIs)

B.

Documented procedures

C.

Information security policies

D.

Information security standards

Full Access
Question # 284

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

A.

The program has not decreased threat counts.

B.

The program has not considered business impact.

C.

The program has been significantly revised

D.

The program uses non-customized training modules.

Full Access
Question # 285

Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?

A.

Increased time to remediate vulnerabilities

B.

Inaccurate reporting of results

C.

Increased number of vulnerabilities

D.

Network performance degradation

Full Access
Question # 286

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 287

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

A.

The risk practitioner

B.

The risk owner

C.

The control owner

D.

The audit manager

Full Access
Question # 288

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

A.

Code review

B.

Penetration test

C.

Gap assessment

D.

Business impact analysis (BIA)

Full Access
Go to page: