Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 353

During a data loss incident, which role in the RACI chart would be aligned to the risk practitioner?

A.

Responsible

B.

Accountable

C.

Informed

D.

Consulted

Full Access
Question # 354

The patch management process is MOST effectively monitored through which of the following key control indicators (KCIs)?

A.

Number of legacy servers out of support

B.

Percentage of patches deployed within the target time frame

C.

Number of patches deployed outside of business hours

D.

Percentage of patched systems tested

Full Access
Question # 355

A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

A.

IT infrastructure manager

B.

Chief Risk Officer (CRO)

C.

Business continuity manager

D.

Business application owner

Full Access
Question # 356

A business unit has implemented robotic process automation (RPA) for its

repetitive back-office tasks. Which of the following should be the risk

practitioner ' s GREATEST concern?

A.

The security team is unaware of the implementation.

B.

The organization may lose institutional knowledge.

C.

The robots may fail to work effectively.

D.

Virtual clients are used for implementation.

Full Access
Question # 357

Who should be responsible for implementing and maintaining security controls?

A.

End user

B.

Internal auditor

C.

Data owner

D.

Data custodian

Full Access
Question # 358

Which of the following is MOST important to consider before determining a response to a vulnerability?

A.

The likelihood and impact of threat events

B.

The cost to implement the risk response

C.

Lack of data to measure threat events

D.

Monetary value of the asset

Full Access
Question # 359

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Full Access
Question # 360

A risk owner should be the person accountable for:

A.

the risk management process

B.

managing controls.

C.

implementing actions.

D.

the business process.

Full Access
Go to page: