Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 417

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Establishing a series of key risk indicators (KRIs)

B.

Adding risk triggers to entries in the risk register

C.

Implementing key performance indicators (KPIs)

D.

Developing contingency plans for key processes

Full Access
Question # 418

A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?

A.

Impact of the change on inherent risk.

B.

Approval for the change by the risk owner.

C.

Business rationale for the change.

D.

Risk to the mitigation effort due to the change.

Full Access
Question # 419

A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?

A.

Subscribe to threat intelligence to monitor external attacks.

B.

Apply patches for a newer version of the application.

C.

Segment the application within the existing network.

D.

Increase the frequency of regular system and data backups.

Full Access
Question # 420

Which of the following is the MOST important consideration when prioritizing risk response?

A.

Requirements for regulatory obligations.

B.

Cost of control implementation.

C.

Effectiveness of risk treatment.

D.

Number of risk response options.

Full Access
Question # 421

Which of the following is the BEST method to track asset inventory?

A.

Periodic asset review by management

B.

Asset registration form

C.

Automated asset management software

D.

IT resource budgeting process

Full Access
Question # 422

Which of the following describes the relationship between risk appetite and risk tolerance?

A.

Risk appetite is completely independent of risk tolerance.

B.

Risk tolerance is used to determine risk appetite.

C.

Risk appetite and risk tolerance are synonymous.

D.

Risk tolerance may exceed risk appetite.

Full Access
Question # 423

Which of the following is MOST important for managing ethical risk?

A.

Involving senior management in resolving ethical disputes

B.

Developing metrics to trend reported ethics violations

C.

Identifying the ethical concerns of each stakeholder

D.

Establishing a code of conduct for employee behavior

Full Access
Question # 424

Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?

A.

To validate the quality of defined deliverables for the program

B.

To detect increases in program costs

C.

To ensure program risk events are mitigated in a timely manner

D.

To provide timely reporting to the governance steering committee

Full Access
Go to page: