Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 377

Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?

A.

Chief financial officer

B.

Information security director

C.

Internal audit director

D.

Chief information officer

Full Access
Question # 378

A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?

A.

Preventive

B.

Detective

C.

Directive

D.

Deterrent

Full Access
Question # 379

Which of the following would provide the MOST comprehensive information for updating an organization's risk register?

A.

Results of the latest risk assessment

B.

Results of a risk forecasting analysis

C.

A review of compliance regulations

D.

Findings of the most recent audit

Full Access
Question # 380

Of the following, who should be responsible for determining the inherent risk rating of an application?

A.

Application owner

B.

Senior management

C.

Risk practitioner

D.

Business process owner

Full Access
Question # 381

An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?

A.

Evaluate the organization's existing data protection controls.

B.

Reassess the risk appetite and tolerance levels of the business.

C.

Evaluate the sensitivity of data that the business needs to handle.

D.

Review the organization’s data retention policy and regulatory requirements.

Full Access
Question # 382

To help ensure the success of a major IT project, it is MOST important to:

A.

obtain the appropriate stakeholders' commitment.

B.

align the project with the IT risk framework.

C.

obtain approval from business process owners.

D.

update the risk register on a regular basis.

Full Access
Question # 383

Which of the following is the PRIMARY reason for logging in a production database environment?

A.

To provide evidence of activities

B.

To prevent illicit actions of database administrators (DBAs)

C.

To ensure that changes are authorized

D.

To ensure that changes made are correctly applied

Full Access
Question # 384

Which of the following is the BEST response when a potential IT control deficiency has been identified?

A.

Remediate and report the deficiency to the enterprise risk committee.

B.

Verify the deficiency and then notify the business process owner.

C.

Verify the deficiency and then notify internal audit.

D.

Remediate and report the deficiency to senior executive management.

Full Access
Go to page: