Weekend Special Sale Limited Time 70% Discount Offer - Ends in 1d 22h 3m 6s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 377

Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?

A.

IT management

B.

Internal audit

C.

Process owners

D.

Senior management

Full Access
Question # 378

An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?

A.

The service provider

B.

Vendor risk manager

C.

Legal counsel

D.

Business process owner

Full Access
Question # 379

Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?

A.

Customized regional training on local laws and regulations

B.

Policies requiring central reporting of potential procedure exceptions

C.

Ongoing awareness training to support a common risk culture

D.

Zero-tolerance policies for risk taking by middle-level managers

Full Access
Question # 380

Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?

A.

To enable consistent data on risk to be obtained

B.

To allow for proper review of risk tolerance

C.

To identify dependencies for reporting risk

D.

To provide consistent and clear terminology

Full Access
Question # 381

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?

A.

Conduct an abbreviated version of the assessment.

B.

Report the business unit manager for a possible ethics violation.

C.

Perform the assessment as it would normally be done.

D.

Recommend an internal auditor perform the review.

Full Access
Question # 382

Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?

A.

Data owner

B.

Control owner

C.

Risk owner

D.

System owner

Full Access
Question # 383

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

A.

Educating employees on what needs to be kept confidential

B.

Implementing a data loss prevention (DLP) solution

C.

Taking punitive action against employees who expose confidential data

D.

Requiring employees to sign nondisclosure agreements

Full Access
Question # 384

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.

Insurance coverage

B.

Security awareness training

C.

Policies and standards

D.

Risk appetite and tolerance

Full Access
Go to page: