Download Certified in Risk and Information Systems Control.CRISC.Train4Sure.2018-12-22.242q.tqb

Vendor: ISACA
Exam Code: CRISC
Exam Name: Certified in Risk and Information Systems Control
Date: Dec 22, 2018
File Size: 1 MB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Purchase
Coupon: EXAM_HUB

Discount: 20%

Demo Questions

Question 1
You and your project team are identifying the risks that may exist within your project. Some of the risks are small risks that won't affect your project much if they happen. 
What should you do with these identified risk events?
  1. These risks can be dismissed.
  2. These risks can be accepted.
  3. These risks can be added to a low priority risk watch list.
  4. All risks must have a valid, documented risk response.
Correct answer: C
Explanation:
Low-impact, low-probability risks can be added to the low priority risk watch list. Incorrect Answers:A: These risks are not dismissed; they are still documented on the low priority risk watch list.B: While these risks may be accepted, they should be documented on the low priority risk watch list. This list will be periodically reviewed and the status of the risks may change. D: Not every risk demands a risk response, so this choice is incorrect.
Low-impact, low-probability risks can be added to the low priority risk watch list. 
Incorrect Answers:
A: These risks are not dismissed; they are still documented on the low priority risk watch list.
B: While these risks may be accepted, they should be documented on the low priority risk watch list. This list will be periodically reviewed and the status of the risks may change. 
D: Not every risk demands a risk response, so this choice is incorrect.
Question 2
You are the project manager of your enterprise. You have introduced an intrusion detection system for the control. You have identified a warning of violation of 
security policies of your enterprise. What type of control is an intrusion detection system (IDS)?  
  1. Detective
  2. Corrective 
  3. Preventative
  4. Recovery
Correct answer: A
Explanation:
An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPS for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. As IDS detects and gives warning when the violation of security policies of the enterprise occurs, it is a detective control. Incorrect Answers:B: These controls make effort to reduce the impact of a threat from problems discovered by detective controls. As IDS only detects but not reduce the impact, hence it is not a corrective control. C: As IDS only detects the problem when it occurs and not prior of its occurrence, it is not preventive control.D: These controls make efforts to overcome the impact of the incident on the business, hence IDS is not a recovery control.
An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPS for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. 
As IDS detects and gives warning when the violation of security policies of the enterprise occurs, it is a detective control. 
Incorrect Answers:
B: These controls make effort to reduce the impact of a threat from problems discovered by detective controls. As IDS only detects but not reduce the impact, hence it is not a corrective control. 
C: As IDS only detects the problem when it occurs and not prior of its occurrence, it is not preventive control.
D: These controls make efforts to overcome the impact of the incident on the business, hence IDS is not a recovery control.
Question 3
What are the functions of audit and accountability control?  
Each correct answer represents a complete solution. (Choose three.)
  1. Provides details on how to protect the audit logs
  2. Implement effective access control
  3. Implement an effective audit program
  4. Provides details on how to determine what to audit
Correct answer: ACD
Explanation:
Audit and accountability family of controls helps an organization implement an effective audit program. It provides details on how to determine what to audit. It provides details on how to protect the audit logs. It also includes information on using audit logs for non-repudiation. Incorrect Answers:B: Access Control is the family of controls that helps an organization implement effective access control. They ensure that users have the rights and permissions they need to perform their jobs, and no more. It includes principles such as least privilege and separation of duties. Audit and accountability family of controls do not help in implementing effective access control.
Audit and accountability family of controls helps an organization implement an effective audit program. It provides details on how to determine what to audit. It provides details on how to protect the audit logs. It also includes information on using audit logs for non-repudiation. 
Incorrect Answers:
B: Access Control is the family of controls that helps an organization implement effective access control. They ensure that users have the rights and permissions they need to perform their jobs, and no more. It includes principles such as least privilege and separation of duties. 
Audit and accountability family of controls do not help in implementing effective access control.
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!