CRISC Exam Question 366
You are using Information system. You have chosen a poor password and also sometimes transmits data over unprotected communication lines. What is this poor quality of password and unsafe transmission refers to?
CRISC Exam Question 367
Which of the following conditions presents the GREATEST risk to an application?
CRISC Exam Question 368
Which of the following characteristics of risk controls can be defined as under?
"The separation of controls in the production environment rather than the separation in the design and implementation of the risk"
"The separation of controls in the production environment rather than the separation in the design and implementation of the risk"
CRISC Exam Question 369
Mary is a project manager in her organization. On her current project she is working with her project team and other key stakeholders to identify the risks within the project. She is currently aiming to create a comprehensive list of project risks so she is using a facilitator to help generate ideas about project risks. What risk identification method is Mary likely using?
CRISC Exam Question 370
There are five inputs to the quantitative risk analysis process. Which one of the following is NOT an input to quantitative risk analysis process?