100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CRISC EXAM 2024 ACTUAL EXAM QUESTIONS WITH DETAILED VERIFIED ANSWERS ALREADY GRADED A+ $14.49   Add to cart

Exam (elaborations)

CRISC EXAM 2024 ACTUAL EXAM QUESTIONS WITH DETAILED VERIFIED ANSWERS ALREADY GRADED A+

1 review
 9 views  0 purchase
  • Course
  • Institution

CRISC EXAM 2024 ACTUAL EXAM QUESTIONS WITH DETAILED VERIFIED ANSWERS ALREADY GRADED A+

Preview 4 out of 113  pages

  • July 1, 2024
  • 113
  • 2023/2024
  • Exam (elaborations)
  • Questions & answers

1  review

review-writer-avatar

By: LECTNAVAL • 3 months ago

avatar-seller
CRISC EXAM 2024 ACTUAL EXAM QUESTIONS WITH
DETAILED VERIFIED ANSWERS /ALREADY GRADED
A+

R1-1 Which of the following is MOST important to determine when defining risk management strategies?

• Risk assessment criteria

• IT architecture complexity

• An enterprise disaster recovery plan

• Business objectives and operations - ✔◻✔◻D is the correct answer.

Justification:

• Information on the internal and external environment must be collected to define a strategy and
identify its

impact. Risk assessment criteria alone are not sufficient.

• IT architecture complexity is more directly related to assessing risk than defining strategies.

• An enterprise disaster recovery plan is more directly related to mitigating the risk.

• While defining risk management strategies, the risk practitioner needs to analyze the

organization's objectives and risk tolerance and define a risk management framework based on this

analysis. Some organizations may accept known risk, while others may invest in and apply mitigating

controls to reduce risk.



R1-2 Which of the following is the MOST important information to include in a risk management
strategic plan?

• Risk management staffing requirements

• The risk management mission statement

• Risk mitigation investment plans

• The current state and desired future state - ✔◻✔◻D is the correct answer.

Justification:

,• Risk management staffing requirements are generally driven by a robust understanding of the
current and

desired future state.

• The risk management mission statement is important but is not an actionable part of a risk
management

strategic plan.

• Risk mitigation investment plans are generally driven by a robust understanding of the current
and desired

future state.

• It is most important to paint a vision for the future and then draw a road map from the starting

point; therefore, this requires that the current state and desired future state be fully understood.



R1-3 Information that is no longer required to support the main purpose of the business from an
information security

perspective should be:

• analyzed under the retention policy.

• protected under the information classification policy.

• analyzed under the backup policy.

• protected under the business impact analysis. - ✔◻✔◻A is the correct answer.

Justification:

• Information that is no longer required should be analyzed under the retention policy to

determine whether the organization is required to maintain the data for business, legal or regulatory

reasons. Keeping data that are no longer required unnecessarily consumes resources; may be in breach

of legal and regulatory obligations regarding retention of data; and, in the case of sensitive personal

information, can increase the risk of data compromise.

• The information classification policy should specify retention and destruction of information that
is no longer

,of value to the core business, as applicable.

• The backup policy is generally based on recovery point objectives. The information classification
policy

should specify retention and destruction of backup media.

• A business impact analysis can help determine that this information does not support the main
objective of the

business, but does not indicate the action to take.



R1-4 An enterprise has outsourced the majority of its IT department to a third party whose servers are in
a foreign

country. Which of the following is the MOST critical security consideration?

• A security breach notification may get delayed due to the time difference.

• Additional network intrusion detection sensors should be installed, resulting in additional cost.

• The enterprise could be unable to monitor compliance with its internal security and privacy
guidelines.

• Laws and regulations of the country of origin may not be enforceable in the foreign country. -
✔◻✔
◻D is the correct answer.

Justification:

• Security breach notification is not a problem. Time difference does not play a role in a 24/7
environment.

Mobile devices (smartphones, tablets, etc.) are usually available to communicate a notification.

• The need for additional network intrusion sensors is a manageable problem that requires
additional funding,

but can be addressed.

• Outsourcing does not remove the enterprise's responsibility regarding internal requirements.

, • Laws and regulations of the country of origin may not be enforceable in the foreign country.

Conversely, the laws and regulations of the foreign vendor may also affect the enterprise. Potential

violation of local laws applicable to the enterprise or the vendor may not be recognized or remedied due



to the lack of knowledge of local laws and/or inability to enforce them.



R1-5 An enterprise recently developed a breakthrough technology that could provide a significant
competitive edge.

Which of the following FIRST governs how this information is to be protected from within the enterprise?

• The data classification policy

• The acceptable use policy

• Encryption standards

• The access control policy - ✔◻✔◻A is the correct answer.

Justification:

• A data classification policy describes the data classification categories, level of protection to be
provided

for each category of data and roles and responsibilities of potential users, including data owners.

• An acceptable use policy is oriented more toward the end user and, therefore, does not
specifically address

which controls should be in place to adequately protect information.

• Mandated levels of protection, as defined by the data classification policy, should drive which
levels of

encryption will be in place.

• Mandated levels of protection, as defined by the data classification policy, should drive which
access controls

will be in place.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Hosmerit. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$14.49
  • (1)
  Add to cart