Download Certified in Risk and Information Systems Control.CRISC.Prep4Sure.2020-03-19.373q.vcex

Vendor: ISACA
Exam Code: CRISC
Exam Name: Certified in Risk and Information Systems Control
Date: Mar 19, 2020
File Size: 478 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
Which of the following is the MOST important reason to maintain key risk indicators (KRIs)?
  1. In order to avoid risk
  2. Complex metrics require fine-tuning
  3. Risk reports need to be timely
  4. Threats and vulnerabilities change over time
Correct answer: D
Explanation:
Threats and vulnerabilities change over time and KRI maintenance ensures that KRIs continue to effectively capture these changes. The risk environment is highly dynamic as the enterprise's internal and external environments are constantly changing. Therefore, the set of KRIs needs to be changed over time, so that they can capture the changes in threat and vulnerability. Incorrect Answers:A: Risk avoidance is one possible risk response. Risk responses are based on KRI reporting, but is not the reason for maintenance of KRIs.B: While most key risk indicator (KRI) metrics need to be optimized in respect to their sensitivity, the most important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in threats and vulnerabilities over time. Hence the most important reason is that because of change of threat and vulnerability overtime.C: Risk reporting timeliness is a business requirement, but is not a reason for KRI maintenance.
Threats and vulnerabilities change over time and KRI maintenance ensures that KRIs continue to effectively capture these changes. 
The risk environment is highly dynamic as the enterprise's internal and external environments are constantly changing. Therefore, the set of KRIs needs to be changed over time, so that they can capture the changes in threat and vulnerability. 
Incorrect Answers:
A: Risk avoidance is one possible risk response. Risk responses are based on KRI reporting, but is not the reason for maintenance of KRIs.
B: While most key risk indicator (KRI) metrics need to be optimized in respect to their sensitivity, the most important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in threats and vulnerabilities over time. Hence the most important reason is that because of change of threat and vulnerability overtime.
C: Risk reporting timeliness is a business requirement, but is not a reason for KRI maintenance.
Question 2
You are the project manager of a HGT project that has recently finished the final compilation process. The project customer has signed off on the project completion and you have to do few administrative closure activities. In the project, there were several large risks that could have wrecked the project but you and your project team found some new methods to resolve the risks without affecting the project costs or project completion date. What should you do with the risk responses that you have identified during the project's monitoring and controlling process?
  1. Include the responses in the project management plan.
  2. Include the risk responses in the risk management plan.
  3. Include the risk responses in the organization's lessons learned database.
  4. Nothing. The risk responses are included in the project's risk register already.
Correct answer: C
Explanation:
The risk responses that do not exist up till then, should be included in the organization's lessons learned database so other project managers can use these responses in their project if relevant. Incorrect Answers:A: The responses are not in the project management plan, but in the risk response plan during the project and they'll be entered into the organization's lessons learned database.B: The risk responses are included in the risk response plan, but after completing the project, they should be entered into the organization's lessons learned database.D: If the new responses that were identified is only included in the project's risk register then it may not be shared with project managers working on some other project.
The risk responses that do not exist up till then, should be included in the organization's lessons learned database so other project managers can use these responses in their project if relevant. 
Incorrect Answers:
A: The responses are not in the project management plan, but in the risk response plan during the project and they'll be entered into the organization's lessons learned database.
B: The risk responses are included in the risk response plan, but after completing the project, they should be entered into the organization's lessons learned database.
D: If the new responses that were identified is only included in the project's risk register then it may not be shared with project managers working on some other project.
Question 3
You are the project manager of GHT project. You have identified a risk event on your project that could save $100,000 in project costs if it occurs. Which of the following statements BEST describes this risk event?
  1. This risk event should be mitigated to take advantage of the savings.
  2. This is a risk event that should be accepted because the rewards outweigh the threat to the project.
  3. This risk event should be avoided to take full advantage of the potential savings.
  4. This risk event is an opportunity to the project and should be exploited.
Correct answer: D
Explanation:
This risk event has the potential to save money on project costs, so it is an opportunity, and the appropriate strategy to use in this case is the exploit strategy. The exploit response is one of the strategies to negate risks or threats appear in a project. This strategy may be selected for risks with positive impacts where the organization wishes to ensure that the opportunity is realized. Exploiting a risk event provides opportunities for positive impact on a project. Assigning more talented resources to the project to reduce the time to completion is an example of exploit response. Incorrect Answers:A, C: Mitigation and avoidance risk response is used in case of negative risk events, and not in positive risk events. Here in this scenario, as it is stated that the event could save $100,000, hence it is a positive risk event. Therefore should not be mitigated or avoided.B: To accept risk means that no action is taken relative to a particular risk; loss is accepted if it occurs. But as this risk event bring an opportunity, it should me exploited and not accepted.
This risk event has the potential to save money on project costs, so it is an opportunity, and the appropriate strategy to use in this case is the exploit strategy. The exploit response is one of the strategies to negate risks or threats appear in a project. This strategy may be selected for risks with positive impacts where the organization wishes to ensure that the opportunity is realized. Exploiting a risk event provides opportunities for positive impact on a project. Assigning more talented resources to the project to reduce the time to completion is an example of exploit response. 
Incorrect Answers:
A, C: Mitigation and avoidance risk response is used in case of negative risk events, and not in positive risk events. Here in this scenario, as it is stated that the event could save $100,000, hence it is a positive risk event. Therefore should not be mitigated or avoided.
B: To accept risk means that no action is taken relative to a particular risk; loss is accepted if it occurs. But as this risk event bring an opportunity, it should me exploited and not accepted.
Question 4
You are the project manager of a large construction project. This project will last for 18 months and will cost $750,000 to complete. You are working with your project team, experts, and stakeholders to identify risks within the project before the project work begins. Management wants to know why you have scheduled so many risk identification meetings throughout the project rather than just initially during the project planning. What is the best reason for the duplicate risk identification sessions?
  1. The iterative meetings allow all stakeholders to participate in the risk identification processes throughout the project phases.
  2. The iterative meetings allow the project manager to discuss the risk events which have passed the project and which did not happen.
  3. The iterative meetings allow the project manager and the risk identification participants to identify newly discovered risk events throughout the project.
  4. The iterative meetings allow the project manager to communicate pending risks events during project execution.
Correct answer: C
Explanation:
Risk identification is an iterative process because new risks may evolve or become known as the project progresses through its life cycle. Incorrect Answers:A: Stakeholders are encouraged to participate in the risk identification process, but this is not the best choice.B: Risk identification focuses on discovering new risk events, not the events which did not happen.D: The primary reason for iterations of risk identification is to identify new risk events.
Risk identification is an iterative process because new risks may evolve or become known as the project progresses through its life cycle. 
Incorrect Answers:
A: Stakeholders are encouraged to participate in the risk identification process, but this is not the best choice.
B: Risk identification focuses on discovering new risk events, not the events which did not happen.
D: The primary reason for iterations of risk identification is to identify new risk events.
Question 5
Which of the following is the MOST important use of KRIs?
  1. Providing a backward-looking view on risk events that have occurred
  2. Providing an early warning signal
  3. Providing an indication of the enterprise's risk appetite and tolerance
  4. Enabling the documentation and analysis of trends
Correct answer: B
Explanation:
Key Risk Indicators are the prime monitoring indicators of the enterprise. KRIs are highly relevant and possess a high probability of predicting or indicating important risk. KRIs help in avoiding excessively large number of risk indicators to manage and report that a large enterprise may have. As KRIs are the indicators of risk, hence its most important function is to effectively give an early warning signal that a high risk is emerging to enable management to take proactive action before the risk actually becomes a loss. Incorrect Answers:A: This is one of the important functions of KRIs which can help management to improve but is not as important as giving early warning.C: KRIs provide an indication of the enterprise's risk appetite and tolerance through metric setting, but this is not as important as giving early warning.D: This is not as important as giving early warning.
Key Risk Indicators are the prime monitoring indicators of the enterprise. KRIs are highly relevant and possess a high probability of predicting or indicating important risk. KRIs help in avoiding excessively large number of risk indicators to manage and report that a large enterprise may have. 
As KRIs are the indicators of risk, hence its most important function is to effectively give an early warning signal that a high risk is emerging to enable management to take proactive action before the risk actually becomes a loss. 
Incorrect Answers:
A: This is one of the important functions of KRIs which can help management to improve but is not as important as giving early warning.
C: KRIs provide an indication of the enterprise's risk appetite and tolerance through metric setting, but this is not as important as giving early warning.
D: This is not as important as giving early warning.
Question 6
Which of the following controls is an example of non-technical controls?
  1. Access control
  2. Physical security
  3. Intrusion detection system
  4. Encryption
Correct answer: B
Explanation:
Physical security is an example of non-technical control. It comes under the family of operational controls. Incorrect Answers:A, C, D: Intrusion detection system, access control, and encryption are the safeguards that are incorporated into computer hardware, software or firmware, hence they refer to as technical controls.
Physical security is an example of non-technical control. It comes under the family of operational controls. 
Incorrect Answers:
A, C, D: Intrusion detection system, access control, and encryption are the safeguards that are incorporated into computer hardware, software or firmware, hence they refer to as technical controls.
Question 7
You are the project manager of GHT project. Your project team is in the process of identifying project risks on your current project. The team has the option to use all of the following tools and techniques to diagram some of these potential risks EXCEPT for which one?
  1. Process flowchart
  2. Ishikawa diagram
  3. Influence diagram
  4. Decision tree diagram
Correct answer: D
Explanation:
Decision tree diagrams are used during the Quantitative risk analysis process and not in risk identification. Incorrect Answers:A, B, C: All these options are diagrammatical techniques used in the Identify risks process.
Decision tree diagrams are used during the Quantitative risk analysis process and not in risk identification. 
Incorrect Answers:
A, B, C: All these options are diagrammatical techniques used in the Identify risks process.
Question 8
Which of the following aspect of monitoring tool ensures that the monitoring tool has the ability to keep up with the growth of an enterprise?
  1. Scalability
  2. Customizability
  3. Sustainability
  4. Impact on performance
Correct answer: A
Explanation:
Monitoring tools have to be able to keep up with the growth of an enterprise and meet anticipated growth in process, complexity or transaction volumes; this is ensured by the scalability criteria of the monitoring tool. Incorrect Answers:B: For software to be effective, it must be customizable to the specific needs of an enterprise. Hence customizability ensures that end users can adapt the software.C: It ensures that monitoring software is able to change at the same speed as technology applications and infrastructure to be effective over time.D: The impact on performance has nothing related to the ability of monitoring tool to keep up with the growth of enterprise.
Monitoring tools have to be able to keep up with the growth of an enterprise and meet anticipated growth in process, complexity or transaction volumes; this is ensured by the scalability criteria of the monitoring tool. 
Incorrect Answers:
B: For software to be effective, it must be customizable to the specific needs of an enterprise. Hence customizability ensures that end users can adapt the software.
C: It ensures that monitoring software is able to change at the same speed as technology applications and infrastructure to be effective over time.
D: The impact on performance has nothing related to the ability of monitoring tool to keep up with the growth of enterprise.
Question 9
You are the project manager in your enterprise. You have identified risk that is noticeable failure threatening the success of certain goals of your enterprise. In which of the following levels do this identified risk exists?
  1. Moderate risk
  2. High risk
  3. Extremely high risk
  4. Low risk
Correct answer: A
Explanation:
Moderate risks are noticeable failure threatening the success of certain goals. Incorrect Answers:B: High risk is the significant failure impacting in certain goals not being met.C: Extremely high risk are the risks that has large impact on enterprise and are most likely results in failure with severe consequences.D: Low risks are the risk that results in certain unsuccessful goals.
Moderate risks are noticeable failure threatening the success of certain goals. 
Incorrect Answers:
B: High risk is the significant failure impacting in certain goals not being met.
C: Extremely high risk are the risks that has large impact on enterprise and are most likely results in failure with severe consequences.
D: Low risks are the risk that results in certain unsuccessful goals.
Question 10
Which of the following processes is described in the statement below? 
"It is the process of exchanging information and views about risks among stakeholders, such as groups, individuals, and institutions."
  1. Risk governance
  2. Risk identification
  3. Risk response planning
  4. Risk communication
Correct answer: D
Explanation:
Risk communication is the process of exchanging information and views about risks among stakeholders, such as groups, individuals, and institutions. Risk communication is mostly concerned with the nature of risk or expressing concerns, views, or reactions to risk managers or institutional bodies for risk management. The key plan to consider and communicate risk is to categorize and impose priorities, and acquire suitable measures to reduce risks. It is important throughout any crisis to put across multifaceted information in a simple and clear manner. Risk communication helps in switching or allocating the information concerning risk among the decision-maker and the stakeholders. Risk communication can be explained more clearly with the help of the following definitions:It defines the issue of what a group does, not just what it says. It must take into account the valuable element in user's perceptions of risk. It will be more valuable if it is thought of as conversation, not instruction. Risk communication is a fundamental and continuing element of the risk analysis exercise, and the involvement of the stakeholder group is from the beginning. It makes the stakeholders conscious of the process at each phase of the risk assessment. It helps to guarantee that the restrictions, outcomes, consequence, logic, and risk assessment are undoubtedly understood by all the stakeholders. Incorrect Answers:C: A risk response ensures that the residual risk is within the limits of the risk appetite and tolerance of the enterprise. Risk response is process of selecting the correct, prioritized response to risk, based on the level of risk, the enterprise's risk tolerance and the cost and benefit of the particular risk response option.Risk response ensures that management is providing accurate reports on:The level of risk faced by the enterprise The incidents' type that have occurred Any alteration in the enterprise's risk profile based on changes in the risk environment
Risk communication is the process of exchanging information and views about risks among stakeholders, such as groups, individuals, and institutions. Risk communication is mostly concerned with the nature of risk or expressing concerns, views, or reactions to risk managers or institutional bodies for risk management. The key plan to consider and communicate risk is to categorize and impose priorities, and acquire suitable measures to reduce risks. It is important throughout any crisis to put across multifaceted information in a simple and clear manner. 
Risk communication helps in switching or allocating the information concerning risk among the decision-maker and the stakeholders. Risk communication can be explained more clearly with the help of the following definitions:
  • It defines the issue of what a group does, not just what it says. 
  • It must take into account the valuable element in user's perceptions of risk. 
  • It will be more valuable if it is thought of as conversation, not instruction. 
Risk communication is a fundamental and continuing element of the risk analysis exercise, and the involvement of the stakeholder group is from the beginning. It makes the stakeholders conscious of the process at each phase of the risk assessment. It helps to guarantee that the restrictions, outcomes, consequence, logic, and risk assessment are undoubtedly understood by all the stakeholders. 
Incorrect Answers:
C: A risk response ensures that the residual risk is within the limits of the risk appetite and tolerance of the enterprise. Risk response is process of selecting the correct, prioritized response to risk, based on the level of risk, the enterprise's risk tolerance and the cost and benefit of the particular risk response option.
Risk response ensures that management is providing accurate reports on:
  • The level of risk faced by the enterprise 
  • The incidents' type that have occurred 
  • Any alteration in the enterprise's risk profile based on changes in the risk environment
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!