CRISC Certified in Risk and Information Systems Control – Question594

A risk practitioner has been asked to advise management on developing a log collection and correlation strategy. Which of the following should be the MOST important consideration when developing this strategy?

A.
Ensuring the inclusion of all computing resources as log sources
B. Ensuring time synchronization of log sources
C. Ensuring read-write access to all log sources
D. Ensuring the inclusion of external threat intelligence log sources

Correct Answer: B

CRISC Certified in Risk and Information Systems Control – Question591

Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?

A.
Closed management action plans from the previous audit
B. Annual risk assessment results
C. An updated vulnerability management report
D. A list of identified generic risk scenarios

Correct Answer: B

CRISC Certified in Risk and Information Systems Control – Question588

A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner’s BEST course of action?

A.
Implement a process improvement and replace the old risk register
B. Outsource the process for updating the risk register
C. Identify changes in risk factors and initiate risk reviews
D. Engage an external consultant to redesign the risk management process

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question587

After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:

A.
inform the IT manager of the concerns and propose measures to reduce them
B. inform the process owner of the concerns and propose measures to reduce them
C. inform the development team of the concerns, and together formulate risk reduction measures
D. recommend a program that minimizes the concerns of that production system

Correct Answer: A