CRISC Certified in Risk and Information Systems Control – Question294

You are the project manager of the AFD project for your company. You are working with the project team to reassess existing risk events and to identify risk events that have not happened and whose relevancy to the project has passed. What should you do with these events that have not happened and would not happen now in the project?

A.
Add the risk to the issues log
B. Close the outdated risks
C. Add the risks to the risk register
D. Add the risks to a low-priority watch-list

Correct Answer: B

Explanation:

Explanation: Risks that are now outdated should be closed by the project manager, there is no need to keep record of that.
Incorrect Answers:
A: Risks do not go into the issue log, but the risk register.
C: Identified risks are already in the risk register.
D: Risks with low probability and low impact go on the risk watchlist.

CRISC Certified in Risk and Information Systems Control – Question293

You are the risk professional in Bluewell Inc. You have identified a risk and want to implement a specific risk mitigation activity. What you should PRIMARILY utilize?

A.
Vulnerability assessment report
B. Business case
C. Technical evaluation report
D. Budgetary requirements

Correct Answer: B

Explanation:

Explanation:
As business case includes business need (like new product, change in process, compliance need, etc.) and the requirements of the enterprise (new technology, cost, etc.), risk professional should utilize this for implementing specific risk mitigation activity. Risk professional must look at the costs of the various controls and compare them against the benefits that the organization will receive from the risk response. Hence he/she needs to have knowledge of business case development to illustrate the costs and benefits of the risk response.
Incorrect Answers: A, C, D: These all options are supplemental.

CRISC Certified in Risk and Information Systems Control – Question292

Which of the following will significantly affect the standard information security governance model?

A.
Currency with changing legislative requirements
B. Number of employees
C. Complexity of the organizational structure
D. Cultural differences between physical locations

Correct Answer: C

Explanation:

Explanation: Complexity of the organizational structure will have the most significant impact on the Information security governance model. Some of the elements that impact organizational structure are multiple business units and functions across the organization.
Incorrect Answers:
A: Currency with changing legislative requirements should not have major impact once good governance models are placed, hence, governance will help in effective management of the organization’s ongoing compliance.
B, D: The numbers of employees and the distance between physical locations have less impact on Information security models as well-defined process, technology and people components together provide the proper governance.

CRISC Certified in Risk and Information Systems Control – Question291

You work as a project manager for SoftTech Inc. You are working with the project stakeholders to begin the qualitative risk analysis process. Which of the following inputs will be needed for the qualitative risk analysis process in your project? Each correct answer represents a complete solution. (Choose three.)

A.
Project scope statement
B. Cost management plan
C. Risk register
D. Organizational process assets

Correct Answer: ACD

Explanation:

Explanation:
The primary goal of qualitative risk analysis is to determine proportion of effect and theoretical response. The inputs to the Qualitative Risk Analysis process are:

  • Organizational process assets
  • Project Scope Statement
  • Risk Management Plan
  • Risk Register

Incorrect Answers:
B: The cost management plan is the input to the perform quantitative risk analysis process.

CRISC Certified in Risk and Information Systems Control – Question290

When it appears that a project risk is going to happen, what is this term called?

A.
Issue
B. Contingency response
C. Trigger
D. Threshold

Correct Answer: C

Explanation:

Explanation:
A trigger is a warning sign or a condition that a risk event is likely to occur within the project.
Incorrect Answers:
A: Issues are events that come about as a result of risk events. Risks become issues only after they have actually occurred.
B: A contingency response is a pre-planned response for a risk event, such as a rollback plan.
D: A threshold is a limit that the risk passes to actually become an issue in the project.

CRISC Certified in Risk and Information Systems Control – Question289

You are the project manager of GHT project. You have analyzed the risk and applied appropriate controls. In turn, you got residual risk as a result of this. Residual risk can be used to determine which of the following?

A.
Status of enterprise's risk
B. Appropriate controls to be applied next
C. The area that requires more control
D. Whether the benefits of such controls outweigh the costs

Correct Answer: CD

Explanation:

Explanation:
Residual risk can be used by management to determine:

  • Which areas require more control Whether the benefits of such controls outweigh the costs
  • As residual risk is the output that comes after applying appropriate controls, so it can also estimate the area which need more sophisticated control. If the cost of control is large that its benefits then no control is applied, hence residual risk can determine benefits of these controls over cost.

Incorrect Answers:
A: Status of enterprise’s risk can be determined only after risk monitoring.
B: Appropriate control can only be determined as the result of risk assessment, not through residual risk.

CRISC Certified in Risk and Information Systems Control – Question288

Which of the following statements BEST describes policy?

A.
A minimum threshold of information security controls that must be implemented
B. A checklist of steps that must be completed to ensure information security
C. An overall statement of information security scope and direction
D. A technology-dependent statement of best practices

Correct Answer: C

Explanation:

Explanation:
A policy is an executive mandate which helps in identifying a topic that contains particular risks to avoid or prevent. Policies are high-level documents signed by a person of high authority with the power to force cooperation. The policy is a simple document stating that a particular high-level control objective is important to the organization’s success. Policies are usually only one page in length. The authority of the person mandating a policy will determine the scope of implementation. Hence in other words, policy is an overall statement of information security scope and direction.
Incorrect Answers:
A, B, D: These are not the valid definitions of the policy.

CRISC Certified in Risk and Information Systems Control – Question287

Which of the following are true for threats? Each correct answer represents a complete solution. Choose three.

A.
They can become more imminent as time goes by, or it can diminish
B. They can result in risks from external sources
C. They are possibility
D. They are real
E. They will arise and stay in place until they are properly dealt.

Correct Answer: ABD

Explanation:

Explanation: Threat is an act of coercion wherein an act is proposed to elicit a negative response. Threats are real, while the vulnerabilities are a possibility. They can result in risks from external sources, and can become imminent by time or can diminish.
Incorrect Answers:
C, E: These two are true for vulnerability, but not threat. Unlike the threat, vulnerabilities are possibility and can result in risks from internal sources. They will arise and stay in place until they are properly dealt.

CRISC Certified in Risk and Information Systems Control – Question286

Which of the following components ensures that risks are examined for all new proposed change requests in the change control system?

A.
Configuration management
B. Scope change control
C. Risk monitoring and control
D. Integrated change control

Correct Answer: D

Explanation:

Explanation: Integrated change control is the component that is responsible for reviewing all aspects of a change’s impact on a project – including risks that may be introduced by the new change. Integrated change control is a way to manage the changes incurred during a project. It is a method that manages reviewing the suggestions for changes and utilizing the tools and techniques to evaluate whether the change should be approved or rejected.
Integrated change control is a primary component of the project’s change control system that examines the affect of a proposed change on the entire project.
Incorrect Answers:
A: Configuration management controls and documents changes to the features and functions of the product scope.
B: Scope change control focuses on the processes to allow changes to enter the project scope.
C: Risk monitoring and control is not part of the change control system, so this choice is not valid.

CRISC Certified in Risk and Information Systems Control – Question285

You are working in an enterprise. Your enterprise owned various risks. Which among the following is MOST likely to own the risk to an information system that supports a critical business process?

A.
System users
B. Senior management
C. IT director
D. Risk management department

Correct Answer: B

Explanation:

Explanation: Senior management is responsible for the acceptance and mitigation of all risk. Hence they will also own the risk to an information system that supports a critical business process.
Incorrect Answers:
A: The system users are responsible for utilizing the system properly and following procedures, but they do not own the risk.
C: The IT director manages the IT systems on behalf of the business owners.
D: The risk management department determines and reports on level of risk, but does not own the risk. Risk is owned by senior management.