Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 393

The PRIMARY reason for prioritizing risk scenarios is to:

A.

provide an enterprise-wide view of risk

B.

support risk response tracking

C.

assign risk ownership

D.

facilitate risk response decisions.

Full Access
Question # 394

Which of the following should be considered when selecting a risk response?

A.

Risk scenarios analysis

B.

Risk response costs

C.

Risk factor awareness

D.

Risk factor identification

Full Access
Question # 395

Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?

A.

A comparison of the costs of notice and consent control options

B.

Examples of regulatory fines incurred by industry peers for noncompliance

C.

A report of critical controls showing the importance of notice and consent

D.

A cost-benefit analysis of the control versus probable legal action

Full Access
Question # 396

Which of the following should be the PRIMARY goal of developing information security metrics?

A.

Raising security awareness

B.

Enabling continuous improvement

C.

Identifying security threats

D.

Ensuring regulatory compliance

Full Access
Question # 397

Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?

A.

Time required for backup restoration testing

B.

Change in size of data backed up

C.

Successful completion of backup operations

D.

Percentage of failed restore tests

Full Access
Question # 398

Which of the following provides the BEST evidence that a selected risk treatment plan is effective?

A.

Identifying key risk indicators (KRIs)

B.

Evaluating the return on investment (ROI)

C.

Evaluating the residual risk level

D.

Performing a cost-benefit analysis

Full Access
Question # 399

Which of the following would BEST help an enterprise define and communicate its risk appetite?

A.

Gap analysis

B.

Risk assessment

C.

Heat map

D.

Risk register

Full Access
Question # 400

While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?

A.

Ensuring the vendor does not know the encryption key

B.

Engaging a third party to validate operational controls

C.

Using the same cloud vendor as a competitor

D.

Using field-level encryption with a vendor supplied key

Full Access
Go to page: