CRISC Certified in Risk and Information Systems Control – Question484

During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:

A.
a control mitigation plan is in place
B. residual risk is accepted
C. compensating controls are in place
D. risk management is effective

Correct Answer: A

CRISC Certified in Risk and Information Systems Control – Question483

The compensating control that MOST effectively addresses the risk associated with piggybacking into a restricted area without a dead-man door is:

A.
using two-factor authentication
B. using biometric door locks
C. requiring employees to wear ID badges
D. security awareness training

Correct Answer: D

CRISC Certified in Risk and Information Systems Control – Question482

Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?

A.
Assess the vulnerability management process
B. Conduct a control self-assessment
C. Reassess the inherent risk of the target
D. Conduct a vulnerability assessment

Correct Answer: D

CRISC Certified in Risk and Information Systems Control – Question481

An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner’s FIRST step to address this situation?

A.
Recommend a root cause analysis of the incidents
B. Update the risk tolerance level to acceptable thresholds
C. Recommend additional controls to address the risk
D. Update the incident-related risk trend in the risk register

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question479

An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:

A.
communicate the consequences for violations
B. implement industry best practices
C. reduce the organization’s risk appetite
D. reduce the risk to an acceptable level

Correct Answer: D

CRISC Certified in Risk and Information Systems Control – Question478

When reviewing a business continuity plan (BCP), which of the following would be the MOST significant deficiency?

A.
BCP is often tested using the walkthrough method
B. BCP testing is not in conjunction with the disaster recovery plan (DRP)
C. Each business location has separate, inconsistent BCPs
D. Recovery time objectives (RTOs) do not meet business requirements

Correct Answer: B