Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 345

Which of the following is the BEST way to mitigate the risk to IT infrastructure availability?

A.

Establishing a disaster recovery plan (DRP)

B.

Establishing recovery time objectives (RTOs)

C.

Maintaining a current list of staff contact delays

D.

Maintaining a risk register

Full Access
Question # 346

For a large software development project, risk assessments are MOST effective when performed:

A.

before system development begins.

B.

at system development.

C.

at each stage of the system development life cycle (SDLC).

D.

during the development of the business case.

Full Access
Question # 347

The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

A.

obtain the support of executive management.

B.

map the business processes to supporting IT and other corporate resources.

C.

identify critical business processes and the degree of reliance on support services.

D.

document the disaster recovery process.

Full Access
Question # 348

Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?

A.

Request a budget for implementation

B.

Conduct a threat analysis.

C.

Create a cloud computing policy.

D.

Perform a controls assessment.

Full Access
Question # 349

Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?

A.

To have a unified approach to risk management across the organization

B.

To have a standard risk management process for complying with regulations

C.

To optimize risk management resources across the organization

D.

To ensure risk profiles are presented in a consistent format within the organization

Full Access
Question # 350

Which of the following is MOST important to the successful development of IT risk scenarios?

A.

Cost-benefit analysis

B.

Internal and external audit reports

C.

Threat and vulnerability analysis

D.

Control effectiveness assessment

Full Access
Question # 351

Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?

A.

Privacy risk controls

B.

Business continuity

C.

Risk taxonomy

D.

Management support

Full Access
Question # 352

An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?

A.

Key control owner

B.

Operational risk manager

C.

Business process owner

D.

Chief information security officer (CISO)

Full Access
Go to page: