A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
Correct Answer: D
Backups are the best control to mitigate the impact of a failed IT system upgrade project that has resulted in the corruption of an organization's asset inventory database, as they allow the organization to restore the data from a previous state and resume normal operations. Encryption, authentication, and configuration are not the best controls, as they do not address the data corruption issue, but rather the data security, access, and quality issues, respectively. References = CRISC Review Manual, 7th Edition, page 153.
CRISC Exam Question 537
An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?
Correct Answer: B
According to the CRISC Review Manual, a list of unencrypted databases which contain sensitive data would be the most important information for assessing the risk impact, because it would help to determine the extent and severity of the potential data breach or loss. The risk impact is the effect or consequence of the risk occurrence on the business objectives and operations. A list of unencrypted databases which contain sensitive data would indicate the scope and magnitude of the risk exposure and the potential damage to the confidentiality, integrity, and availability of the data. The other options are not the most important information for assessing the risk impact, as they are less relevant or less specific than a list of unencrypted databases which contain sensitive data. The number of users who can access sensitive data would indicate the level of access control and the likelihood of unauthorized access, but it would not indicate the type and value of the data. The reason some databases have not been encrypted would indicate the cause and rationale of the risk, but it would not indicate the effect or consequence of the risk. The cost required to enforce encryption would indicate the feasibility and affordability of the risk response, but it would not indicate the potential loss or harm of the risk. References = CRISC Review Manual, 7th Edition, Chapter 2, Section 2.2.2, page 78.
CRISC Exam Question 538
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
Correct Answer: D
Cybersecurity incident response procedures are the plans and actions that an organization takes to respond to and recover from a cybersecurity attack. They include identifying the source and scope of the attack, containing and eradicating the threat, restoring normal operations, and analyzing the root cause and lessons learned. Reviewing cybersecurity incident response procedures is the most effective course of action when the probability of a successful cybersecurity attack is increasing and the potential loss could exceed the organization's risk appetite, as it helps to prepare the organization for minimizing the impact and duration of the attack, as well as improving the resilience and security posture of the organization.
CRISC Exam Question 539
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Correct Answer: C
Understanding the Question: * The question asks for the best guidance for developing relevant risk scenarios. Analyzing the Options: * A. Based on industry trends: Important but may not always be directly relevant to the specific organization. * B. Mapped to incident response plans: Useful but secondary to ensuring the scenarios are probable. * C. Related to probable events: Ensures the scenarios are realistic and likely, making them more relevant and actionable. * D. Aligned with risk management capabilities: Important for managing risks but not as critical as ensuring scenarios are probable. Detailed Explanation: * Probable Events: Developing risk scenarios that are based on probable events ensures that the organization is prepared for the most likely risks. This makes risk management efforts more practical and focused on real threats. * Relevance: By focusing on probable events, the scenarios will be more relevant to the organization's actual risk environment, making it easier to allocate resources and plan responses effectively. * References: * CRISC Review Manual, Chapter 2: IT Risk Assessment, emphasizes the importance of identifying and evaluating probable risk events to develop effective risk scenarios.
CRISC Exam Question 540
Which of the following should be an element of the risk appetite of an organization?