Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Isaca Certification CRISC Passing Score

Page: 5 / 136
Total 1810 questions

Certified in Risk and Information Systems Control Questions and Answers

Question 17

Which of the following controls BEST addresses the risk of unauthorized disclosure of sensitive data as a result of a lost bring your own device (BYOD) tablet?

Options:

A.

Unregistered device detection

B.

Device encryption

C.

Device wiping policy

D.

Mobile device antivirus

Question 18

Which of the following is the BEST way to assess the effectiveness of an access management process?

Options:

A.

Comparing the actual process with the documented process

B.

Reviewing access logs for user activity

C.

Reconciling a list of accounts belonging to terminated employees

D.

Reviewing for compliance with acceptable use policy

Question 19

When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

Options:

A.

Reliance on qualitative analysis methods.

B.

Lack of a governance, risk, and compliance (GRC) tool.

C.

Lack of senior management involvement.

D.

Use of multiple risk registers.

Question 20

Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?

Options:

A.

Use an encrypted tunnel lo connect to the cloud.

B.

Encrypt the data in the cloud database.

C.

Encrypt physical hard drives within the cloud.

D.

Encrypt data before it leaves the organization.

Page: 5 / 136
Total 1810 questions