Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 385

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

A.

Relevance to the business process

B.

Regulatory compliance requirements

C.

Cost-benefit analysis

D.

Comparison against best practice

Full Access
Question # 386

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

A.

detected incidents.

B.

residual risk.

C.

vulnerabilities.

D.

inherent risk.

Full Access
Question # 387

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.

Implement segregation of duties.

B.

Enforce an internal data access policy.

C.

Enforce the use of digital signatures.

D.

Apply single sign-on for access control.

Full Access
Question # 388

When evaluating enterprise IT risk management it is MOST important to:

A.

create new control processes to reduce identified IT risk scenarios

B.

confirm the organization’s risk appetite and tolerance

C.

report identified IT risk scenarios to senior management

D.

review alignment with the organization's investment plan

Full Access
Question # 389

The risk associated with an asset after controls are applied can be expressed as:

A.

a function of the cost and effectiveness of controls.

B.

the likelihood of a given threat.

C.

a function of the likelihood and impact.

D.

the magnitude of an impact.

Full Access
Question # 390

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

A.

Sustained financial loss

B.

Cost of remediation efforts

C.

Duration of service outage

D.

Average time to recovery

Full Access
Question # 391

During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?

A.

Conduct a comprehensive review of access management processes.

B.

Declare a security incident and engage the incident response team.

C.

Conduct a comprehensive awareness session for system administrators.

D.

Evaluate system administrators' technical skills to identify if training is required.

Full Access
Question # 392

Which of the following controls BEST helps to ensure that transaction data reaches its destination?

A.

Securing the network from attacks

B.

Providing acknowledgments from receiver to sender

C.

Digitally signing individual messages

D.

Encrypting data-in-transit

Full Access
Go to page: