Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CRISC Exam Dumps - Certified in Risk and Information Systems Control

Go to page:
Question # 465

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk appetite is decreased.

B.

Inherent risk is increased.

C.

Risk tolerance is decreased.

D.

Residual risk is increased.

Full Access
Question # 466

It is MOST important that security controls for a new system be documented in:

A.

testing requirements

B.

the implementation plan.

C.

System requirements

D.

The security policy

Full Access
Question # 467

A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?

A.

Perform a business impact analysis (BIA).

B.

Perform a cost-benefit analysis.

C.

Review industry best practice.

D.

Review risk governance policies.

Full Access
Question # 468

The PRIMARY purpose of a maturity model is to compare the:

A.

current state of key processes to their desired state.

B.

actual KPIs with target KPIs.

C.

organization to industry best practices.

D.

organization to peers.

Full Access
Question # 469

Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?

A.

Control matrix documentation

B.

Vendor security reports

C.

Service Level Agreement (SLA)

D.

An independent third-party audit

Full Access
Question # 470

The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:

A.

serve as a basis for measuring risk appetite.

B.

align with the organization's risk profile.

C.

provide a warning of emerging high-risk conditions.

D.

provide data for updating the risk register.

Full Access
Question # 471

Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?

A.

Obtaining funding support

B.

Defining the risk assessment scope

C.

Selecting the risk assessment framework

D.

Establishing inherent risk

Full Access
Question # 472

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?

A.

Forensic analysis

B.

Risk assessment

C.

Root cause analysis

D.

Business impact analysis (BlA)

Full Access
Go to page: