Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Isaca Certification CRISC Dumps PDF

Page: 24 / 123
Total 1641 questions

Certified in Risk and Information Systems Control Questions and Answers

Question 93

Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?

Options:

A.

Business strategies and needs

B.

Security features and support

C.

Costs and benefits

D.

Local laws and regulations

Question 94

When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

Options:

A.

Reliance on qualitative analysis methods.

B.

Lack of a governance, risk, and compliance (GRC) tool.

C.

Lack of senior management involvement.

D.

Use of multiple risk registers.

Question 95

A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?

Options:

A.

HR training director

B.

Business process owner

C.

HR recruitment manager

D.

Chief information officer (CIO)

Question 96

Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?

Options:

A.

To validate the quality of defined deliverables for the program

B.

To detect increases in program costs

C.

To ensure program risk events are mitigated in a timely manner

D.

To provide timely reporting to the governance steering committee

Page: 24 / 123
Total 1641 questions