Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Isaca CRISC Based on Real Exam Environment

Page: 33 / 131
Total 1745 questions

Certified in Risk and Information Systems Control Questions and Answers

Question 129

Which of the following is the BEST way to mitigate the risk to IT infrastructure availability?

Options:

A.

Establishing a disaster recovery plan (DRP)

B.

Establishing recovery time objectives (RTOs)

C.

Maintaining a current list of staff contact delays

D.

Maintaining a risk register

Question 130

Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

Options:

A.

Vulnerability and threat analysis

B.

Control remediation planning

C.

User acceptance testing (UAT)

D.

Control self-assessment (CSA)

Question 131

Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?

Options:

A.

Vendor's information security officer

B.

Customer's data privacy officer

C.

Customer's data owner

D.

Vendor's application owner

Question 132

A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

Business application owner

B.

Business continuity manager

C.

Chief risk officer (CRO)

D.

IT infrastructure manager

Page: 33 / 131
Total 1745 questions