Easter Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 457

A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?

A.

Risk likelihood

B.

Risk impact

C.

Risk capacity

D.

Risk appetite

Full Access
Question # 458

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Full Access
Question # 459

A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?

A.

Implement new controls.

B.

Recalibrate the key performance indicator (KPI).

C.

Redesign the process.

D.

Re-evaluate the existing control design.

Full Access
Question # 460

Which of the following would BEST facilitate the maintenance of data classification requirements?

A.

Scheduling periodic audits

B.

Assigning a data custodian

C.

Implementing technical controls over the assets

D.

Establishing a data loss prevention (DLP) solution

Full Access
Question # 461

A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:

A.

mature

B.

ineffective.

C.

optimized.

D.

inefficient.

Full Access
Question # 462

An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?

A.

Database manager

B.

Public relations manager

C.

Data privacy manager

D.

Business manager

Full Access
Question # 463

Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?

A.

Customer notification plans

B.

Capacity management

C.

Access management

D.

Impacts on IT project delivery

Full Access
Question # 464

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

A.

Update firewall configuration

B.

Require strong password complexity

C.

implement a security awareness program

D.

Implement two-factor authentication

Full Access
Go to page: