Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 345

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

A.

Monitoring risk responses

B.

Applying risk treatments

C.

Providing assurance of control effectiveness

D.

Implementing internal controls

Full Access
Question # 346

What is the PRIMARY purpose of a business impact analysis (BIA)?

A.

To determine the likelihood and impact of threats to business operations

B.

To identify important business processes in the organization

C.

To estimate resource requirements for related business processes

D.

To evaluate the priority of business operations in case of disruption

Full Access
Question # 347

Which of the following is MOST important to the successful development of IT risk scenarios?

A.

Cost-benefit analysis

B.

Internal and external audit reports

C.

Threat and vulnerability analysis

D.

Control effectiveness assessment

Full Access
Question # 348

Which of the following tasks should be completed prior to creating a disaster recovery plan (DRP)?

A.

Conducting a business impact analysis (BIA)

B.

Identifying the recovery response team

C.

Procuring a recovery site

D.

Assigning sensitivity levels to data

Full Access
Question # 349

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

A.

Sustained financial loss

B.

Cost of remediation efforts

C.

Duration of service outage

D.

Average time to recovery

Full Access
Question # 350

Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?

A.

To provide data for establishing the risk profile

B.

To provide assurance of adherence to risk management policies

C.

To provide measurements on the potential for risk to occur

D.

To provide assessments of mitigation effectiveness

Full Access
Question # 351

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

A.

Vulnerability scanning

B.

Systems log correlation analysis

C.

Penetration testing

D.

Monitoring of intrusion detection system (IDS) alerts

Full Access
Question # 352

Which of the following is MOST helpful in aligning IT risk with business objectives?

A.

Introducing an approved IT governance framework

B.

Integrating the results of top-down risk scenario analyses

C.

Performing a business impact analysis (BlA)

D.

Implementing a risk classification system

Full Access
Go to page: