CRISC Certified in Risk and Information Systems Control – Question414

A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:

A.
identifying risk mitigation controls
B. documenting the risk scenarios
C. validating the risk scenarios
D. updating the risk register

Correct Answer: C

CRISC Certified in Risk and Information Systems Control – Question413

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

A.
Implement segregation of duties
B. Enforce an internal data access policy
C. Enforce the use of digital signatures
D. Apply single sign-on for access control

Correct Answer: D

CRISC Certified in Risk and Information Systems Control – Question409

The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:

A.
availability of fault tolerant software
B. strategic plan for business growth
C. vulnerability scan results of critical systems
D. redundancy of technical infrastructure

Correct Answer: D

CRISC Certified in Risk and Information Systems Control – Question408

When reviewing management’s IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?

A.
Propose mitigating controls
B. Assess management’s risk tolerance
C. Recommend management accept the low risk scenarios
D. Re-evaluate the risk scenarios associated with the control

Correct Answer: A

CRISC Certified in Risk and Information Systems Control – Question405

Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?

A.
A decrease in the number of key controls
B. Changes in control design
C. An increase in residual risk
D. Changes in control ownership

Correct Answer: D