ISACA Certified in Risk and Information Systems Control CRISC Exam Questions in PDF

Free ISACA CRISC Dumps Questions (page: 8)

What are the two MAJOR factors to be considered while deciding risk appetite level? Each correct answer represents a part of the solution. Choose two.

  1. The amount of loss the enterprise wants to accept
  2. Alignment with risk-culture
  3. Risk-aware decisions
  4. The capacity of the enterprise's objective to absorb loss.

Answer(s): A,D

Explanation:

Risk appetite is the amount of risk a company or other entity is willing to accept in pursuit of its mission. This is the responsibility of the board to decide risk appetite of an enterprise. When considering the risk appetite levels for the enterprise, the following two major factors should be taken into account:

The enterprise's objective capacity to absorb loss, e.g., financial loss, reputation damage, etc.
The culture towards risk taking-cautious or aggressive. In other words, the amount of loss the enterprise wants to accept in pursue of its objective fulfillment.

Incorrect Answers:
B: Alignment with risk-culture is also one of the factors but is not as important as these two.

C: Risk aware decision is not the factor, but is the result which uses risk appetite information as its input.



You are the project manager of the GHY Project for your company. You need to complete a project management process that will be on the lookout for new risks, changing risks, and risks that are now outdated. Which project management process is responsible for these actions?

  1. Risk planning
  2. Risk monitoring and controlling
  3. Risk identification
  4. Risk analysis

Answer(s): B

Explanation:

The risk monitoring and controlling is responsible for identifying new risks, determining the status of risks that may have changed, and determining which risks may be outdated in the project.

Incorrect Answers:
A: Risk planning creates the risk management plan and determines how risks will be identified, analyzed, monitored and controlled, and responded to.

C: Risk identification is a process that identifies risk events in the project.

D: Risk analysis helps determine the severity of the risk events, the risks' priority, and the probability and impact of risks.



You are the project manager of the HGT project in Bluewell Inc. The project has an asset valued at $125,000 and is subjected to an exposure factor of 25 percent. What will be the Single Loss Expectancy of this project?

  1. $ 125,025
  2. $ 31,250
  3. $ 5,000
  4. $ 3,125,000

Answer(s): B

Explanation:

The Single Loss Expectancy (SLE) of this project will be $31,250.

Single Loss Expectancy is a term related to Quantitative Risk Assessment. It can be defined as the monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as follows:

Single Loss Expectancy (SLE) = Asset Value (AV) * Exposure Factor (EF)

where the Exposure Factor represents the impact of the risk over the asset, or percentage of asset lost. As an example, if the Asset Value is reduced two third, the exposure factor value is .66. If the asset is completely lost, the Exposure Factor is 1.0. The result is a monetary value in the same unit as the Single Loss Expectancy is expressed.

Therefore,
SLE = Asset Value * Exposure Factor
= 125,000 * 0.25
= $31,250

Incorrect Answers:
A, C, D: These are not SLEs of this project.



Which of the following are the principles of access controls?
Each correct answer represents a complete solution. Choose three.

  1. Confidentiality
  2. Availability
  3. Reliability
  4. Integrity

Answer(s): A,B,D

Explanation:

The principles of access controls focus on availability, integrity, and confidentiality, as loss or danger is directly related to these three:
Loss of confidentiality- Someone sees a password or a company's secret formula, this is referred to as loss of confidentiality.
Loss of integrity- An e-mail message is modified in transit, a virus infects a file, or someone makes unauthorized changes to a Web site is referred to as loss of integrity.
Loss of availability- An e-mail server is down and no one has e-mail access, or a file server is down so data files aren't available comes under loss of availability.



You are the project manager of GHT project. You have selected appropriate Key Risk Indicators for your project. Now, you need to maintain those Key Risk Indicators. What is the MOST important reason to maintain Key Risk Indicators?

  1. Risk reports need to be timely
  2. Complex metrics require fine-tuning
  3. Threats and vulnerabilities change over time
  4. They help to avoid risk

Answer(s): C

Explanation:

Since the enterprise's internal and external environments are constantly changing, the risk environment is also highly dynamic, i.e., threats and vulnerabilities change over time. Hence KRIs need to be maintained to ensure that KRIs continue to effectively capture these changes.

Incorrect Answers:
A: Timely risk reporting is one of the business requirements, but is not the reason behind KRI maintenance.

B: While most key risk indicator metrics need to be optimized in respect to their sensitivity, the most important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in threats and vulnerabilities over time.

D: Avoiding risk is a type of risk response. Risk responses are based on KRI reporting.



Share your comments for ISACA CRISC exam with other users:

A
Ankit S
11/13/2023 3:58:00 AM

q15. answer is b. simple

S
S. R
12/8/2023 9:41:00 AM

great practice

M
Mungara
3/14/2023 12:10:00 AM

thanks to this exam dumps, i felt confident and passed my exam with ease.

A
Anonymous
7/25/2023 2:55:00 AM

need 1z0-1105-22 exam

N
Nigora
5/31/2022 10:05:00 PM

this is a beautiful tool. passed after a week of studying.

A
Av dey
8/16/2023 2:35:00 PM

can you please upload the dumps for 1z0-1096-23 for oracle

M
Mayur Shermale
11/23/2023 12:22:00 AM

its intresting, i would like to learn more abouth this

J
JM
12/19/2023 2:23:00 PM

q252: dns poisoning is the correct answer, not locator redirection. beaconing is detected from a host. this indicates that the system has been infected with malware, which could be the source of local dns poisoning. location redirection works by either embedding the redirection in the original websites code or having a user click on a url that has an embedded redirect. since users at a different office are not getting redirected, it isnt an embedded redirection on the original website and since the user is manually typing in the url and not clicking a link, it isnt a modified link.

F
Freddie
12/12/2023 12:37:00 PM

helpful dump questions

D
Da Costa
8/25/2023 7:30:00 AM

question 423 eigrp uses metric

B
Bsmaind
8/20/2023 9:22:00 AM

hello nice dumps

B
beau
1/12/2024 4:53:00 PM

good resource for learning

S
Sandeep
12/29/2023 4:07:00 AM

very useful

K
kevin
9/29/2023 8:04:00 AM

physical tempering techniques

B
Blessious Phiri
8/15/2023 4:08:00 PM

its giving best technical knowledge

T
Testbear
6/13/2023 11:15:00 AM

please upload

S
shime
10/24/2023 4:23:00 AM

great question with explanation thanks!!

T
Thembelani
5/30/2023 2:40:00 AM

does this exam have lab sections?

S
Shin
9/8/2023 5:31:00 AM

please upload

P
priti kagwade
7/22/2023 5:17:00 AM

please upload the braindump for .net

R
Robe
9/27/2023 8:15:00 PM

i need this exam 1z0-1107-2. please.

C
Chiranthaka
9/20/2023 11:22:00 AM

very useful!

N
Not Miguel
11/26/2023 9:43:00 PM

for this question - "which three type of basic patient or member information is displayed on the patient info component? (choose three.)", list of conditions is not displayed (it is displayed in patient card, not patient info). so should be thumbnail of chatter photo

A
Andrus
12/17/2023 12:09:00 PM

q52 should be d. vm storage controller bandwidth represents the amount of data (in terms of bandwidth) that a vms storage controller is using to read and write data to the storage fabric.

R
Raj
5/25/2023 8:43:00 AM

nice questions

M
max
12/22/2023 3:45:00 PM

very useful

M
Muhammad Rawish Siddiqui
12/8/2023 6:12:00 PM

question # 208: failure logs is not an example of operational metadata.

S
Sachin Bedi
1/5/2024 4:47:00 AM

good questions

K
Kenneth
12/8/2023 7:34:00 AM

thank you for the test materials!

H
Harjinder Singh
8/9/2023 4:16:00 AM

its very helpful

S
SD
7/13/2023 12:56:00 AM

good questions

K
kanjoe
7/2/2023 11:40:00 AM

good questons

M
Mahmoud
7/6/2023 4:24:00 AM

i need the dumb of the hcip security v4.0 exam

W
Wei
8/3/2023 4:18:00 AM

upload the dump please

AI Tutor 👋 I’m here to help!