Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 425

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

A.

To identify threats introduced by business processes

B.

To identify risk when personal information is collected

C.

To ensure senior management has approved the use of personal information

D.

To ensure compliance with data privacy laws and regulations

Full Access
Question # 426

Which of the following is MOST important for managing ethical risk?

A.

Involving senior management in resolving ethical disputes

B.

Developing metrics to trend reported ethics violations

C.

Identifying the ethical concerns of each stakeholder

D.

Establishing a code of conduct for employee behavior

Full Access
Question # 427

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for

sensitive data?

A.

Assess the threat and associated impact.

B.

Evaluate risk appetite and tolerance levels

C.

Recommend device management controls

D.

Enable role-based access control.

Full Access
Question # 428

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

A.

Assess the loss impact if the information is inadvertently disclosed.

B.

Calculate the overhead required to keep the information secure throughout its life cycle.

C.

Calculate the replacement cost of obtaining the information from alternate sources.

D.

Assess the market value offered by consumers of the information.

Full Access
Question # 429

Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?

A.

Risk and control self-assessment (CSA) reports

B.

Information generated by the systems

C.

Control environment narratives

D.

Confirmation from industry peers

Full Access
Question # 430

Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Creating metrics to track remote connections

B.

Updating the organizational policy for remote access

C.

Updating remote desktop software

D.

Implementing multi-factor authentication

Full Access
Question # 431

An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?

A.

Risk scenarios

B.

Risk ownership

C.

Risk impact

D.

Risk likelihood

Full Access
Question # 432

Which of the following is the BEST risk management approach for the strategic IT planning process?

A.

Key performance indicators (KPIs) are established to track IT strategic initiatives.

B.

The IT strategic plan is reviewed by the chief information security officer (CISO) and enterprise risk management (ERM).

C.

The IT strategic plan is developed from the organization-wide risk management plan.

D.

Risk scenarios associated with IT strategic initiatives are identified and assessed.

Full Access
Go to page: