11.11 Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Searching for workable clues to ace the Isaca CRISC Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s CRISC PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 33

To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?

A.

business owner

B.

IT department

C.

Risk manager

D.

Third-party provider

Full Access
Question # 34

Which of the following is a KEY outcome of risk ownership?

A.

Risk responsibilities are addressed.

B.

Risk-related information is communicated.

C.

Risk-oriented tasks are defined.

D.

Business process risk is analyzed.

Full Access
Question # 35

Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?

A.

Number of users who have signed a BYOD acceptable use policy

B.

Number of incidents originating from BYOD devices

C.

Budget allocated to the BYOD program security controls

D.

Number of devices enrolled in the BYOD program

Full Access
Question # 36

Which of the following should be of GREATEST concern to a risk practitioner reviewing an organization's disaster recovery plan (DRP)?

A.

Risk scenarios used for the plan were last tested two years ago.

B.

The IT steering committee determined the application recovery priorities.

C.

The disaster recovery plan (DRP) does not identify a hot site.

D.

The call list in the plan was last updated a year ago.

Full Access
Question # 37

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

A.

involve IT leadership in the policy development process

B.

Require business users to sign acknowledgment of the poises

C.

involve business owners in the pokey development process

D.

Provide policy owners with greater enforcement authority

Full Access
Question # 38

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

A.

Validating employee social media accounts and passwords

B.

Monitoring Internet usage on employee workstations

C.

Disabling social media access from the organization's technology

D.

Implementing training and awareness programs

Full Access
Question # 39

Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization's risk profile?

A.

Control identification and mitigation

B.

Adoption of a compliance-based approach

C.

Prevention and detection techniques

D.

Scenario analysis and stress testing

Full Access
Question # 40

Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?

A.

It establishes where controls should be implemented.

B.

It ensures relevance to the organization.

C.

It quantifies the materiality of any losses that may occur.

D.

It provides better estimates of the impact of current threats.

Full Access
Go to page: