Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 361

Which of the following would be MOST helpful when communicating roles associated with the IT risk management process?

A.

Skills matrix

B.

Job descriptions

C.

RACI chart

D.

Organizational chart

Full Access
Question # 362

Which of the following is the BEST control to detect an advanced persistent threat (APT)?

A.

Utilizing antivirus systems and firewalls

B.

Conducting regular penetration tests

C.

Monitoring social media activities

D.

Implementing automated log monitoring

Full Access
Question # 363

An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?

A.

Risk owner

B.

IT security manager

C.

IT system owner

D.

Control owner

Full Access
Question # 364

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Full Access
Question # 365

An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?

A.

Migrate all data to another compliant service provider.

B.

Analyze the impact of the provider's control weaknesses to the business.

C.

Conduct a follow-up audit to verify the provider's control weaknesses.

D.

Review the contract to determine if penalties should be levied against the provider.

Full Access
Question # 366

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

Full Access
Question # 367

Which of the following should be the GREATEST concern for an organization that uses open source software applications?

A.

Lack of organizational policy regarding open source software

B.

Lack of reliability associated with the use of open source software

C.

Lack of monitoring over installation of open source software in the organization

D.

Lack of professional support for open source software

Full Access
Question # 368

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

A.

Monitoring

B.

Analysis

C.

Identification

D.

Response selection

Full Access
Go to page: