Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Vce CRISC Questions Latest

Page: 32 / 136
Total 1810 questions

Certified in Risk and Information Systems Control Questions and Answers

Question 125

How should an organization approach the retention of data that is no longer needed for business operations?

Options:

A.

Data should be retained for a reasonable period of time in case of system rollback.

B.

Data should be destroyed or retained on the basis of a cost-benefit analysis.

C.

Data should be retained based on regulatory requirements.

D.

Data should be destroyed to avoid any risk exposure.

Question 126

Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?

Options:

A.

Implement segregation of duties.

B.

Enforce an internal data access policy.

C.

Enforce the use of digital signatures.

D.

Apply single sign-on for access control.

Question 127

Who should have the authority to approve an exception to a control?

Options:

A.

information security manager

B.

Control owner

C.

Risk owner

D.

Risk manager

Question 128

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

Options:

A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Page: 32 / 136
Total 1810 questions