CRISC Certified in Risk and Information Systems Control – Question703

Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?

A.
Utilize the change management process.
B. Validate functionality by running in a test environment.
C. Perform an in-depth code review with an expert.
D. Implement a service level agreement.

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question701

A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

A.
Mask data before being transferred to the test environment.
B. Implement equivalent security in the test environment.
C. Enable data encryption in the test environment.
D. Prevent the use of production data for test purposes.

Correct Answer: B

CRISC Certified in Risk and Information Systems Control – Question699

A risk practitioner is organizing a training session to communicate risk assessment methodologies to ensure a consistent risk view within the organization. Which of the following is the MOST important topic to cover in this training?

A.
Applying risk factors
B. Applying risk appetite
C. Understanding risk culture
D. Referencing risk event data

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question698

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

A.
Plans for mitigating the associated risk
B. Suggestions for improving risk awareness training
C. A recommendation for internal audit validation
D. The impact to the organization’s risk profile

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question697

Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?

A.
Avoiding risks that could materialize into substantial losses
B. Increasing organizational resources to mitigate risks
C. Defining expectations in the enterprise risk policy
D. Communicating external audit results

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question696

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

A.
Require the vendor to have liability insurance.
B. Perform a background check on the vendor.
C. Require the vendor to sign a nondisclosure agreement.
D. Clearly define the project scope.

Correct Answer: D