Free CRISC Exam Braindumps (page: 36)

Page 36 of 451

Which of the following vulnerability assessment software can check for weak passwords on the network?

  1. Password cracker
  2. Antivirus software
  3. Anti-spyware software
  4. Wireshark

Answer(s): A

Explanation:

A password cracker is an application program that is used to identify an unknown or forgotten password on a computer or network resources. It can also be used to help a human cracker obtain unauthorized access to resources. A password cracker can also check for weak passwords on the network and give notifications to put another password.

Incorrect Answers:
B: Antivirus or anti-virus software is used to prevent, detect, and remove malware. It scans the computer for viruses.

C: Anti-spyware software is a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed.

D: Wireshark is a free and open-source protocol analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education.



Which of the following is NOT true for risk governance?

  1. Risk governance is based on the principles of cooperation, participation, mitigation and sustainability, and is adopted to achieve more effective risk management.
  2. Risk governance requires reporting once a year.
  3. Risk governance seeks to reduce risk exposure and vulnerability by filling gaps in risk policy.
  4. Risk governance is a systemic approach to decision making processes associated to natural and technological risks.

Answer(s): B

Explanation:

Risk governance is a continuous life cycle that requires regular reporting and ongoing review, not once a year. Incorrect Answers:
A, C, D: These are true for risk governance.



You are the project manager of HGT project. You have identified project risks and applied appropriate response for its mitigation. You noticed a risk generated as a result of applying response. What this resulting risk is known as?

  1. Pure risk
  2. Secondary risk
  3. Response risk
  4. High risk

Answer(s): B

Explanation:

Secondary risk is a risk that is generated as the result of risk response. Incorrect Answers:
A: A pure risk is a risk that has only a negative effect on the project. Pure risks are activities that are dangerous to complete and manage such as construction, electrical work, or manufacturing.

C, D: These terms are not applied for the risk that is generated as a result of risk response.



What are the various outputs of risk response?

  1. Risk Priority Number
  2. Residual risk
  3. Risk register updates
  4. Project management plan and Project document updates
  5. Risk-related contract decisions

Answer(s): C,D,E

Explanation:

The outputs of the risk response planning process are:
Risk Register Updates: The risk register is written in detail so that it can be related to the priority ranking and the planned response.
Risk Related Contract Decisions: Risk related contract decisions are the decisions to transmit risk, such as services, agreements for insurance, and other items as required. It provides a means for sharing risks.
Project Management Plan Updates: Some of the elements of the project management plan updates are:
- Schedule management plan
- Cost management plan
- Quality management plan
- Procurement management plan
- Human resource management plan
- Work breakdown structure
- Schedule baseline
- Cost performance baseline

Project Document Updates: Some of the project documents that can be updated includes:
- Assumption log updates
- Technical documentation updates

Incorrect Answers:
A: Risk priority number is not an output for risk response but instead it is done before applying response. Hence it acts as one of the inputs of risk response and is not the output of it.

B: Residual risk is not an output of risk response. Residual risk is the risk that remains after applying controls. It is not feasible to eliminate all risks from an organization. Instead, measures can be taken to reduce risk to an acceptable level. The risk that is left is residual risk. As,
Risk = Threat Vulnerability and
Total risk = Threat Vulnerability Asset Value

Residual risk can be calculated with the following formula:
Residual Risk = Total Risk - Controls

Senior management is responsible for any losses due to residual risk. They decide whether a risk should be avoided, transferred, mitigated or accepted. They also decide what controls to implement. Any loss due to their decisions falls on their sides.

Residual risk assessments are conducted after mitigation to determine the impact of the risk on the enterprise. For risk assessment, the effect and frequency is reassessed and the impact is recalculated.



Page 36 of 451



Post your Comments and Discuss ISACA CRISC exam with other Community members:

Fei commented on November 26, 2024
Very good resources
UNITED STATES
upvote

Yingying Li commented on December 02, 2023
Very useful practice tests.
Anonymous
upvote

Stephen commented on August 27, 2023
Can you please share CIMAPRA19-FO2-1 Exam dumps please
Anonymous
upvote

Parsad commented on June 04, 2023
Thank you for the buy 1 get 1 free discount. This helped me a lot. I donot have a lot of money.
INDIA
upvote

Petros commented on May 01, 2023
I could not have passed my certification test without the help of this study guide - highly recommend it!
PORTUGAL
upvote

Bobby commented on January 18, 2022
Passed easily.
UNITED STATES
upvote

Santosh commented on January 29, 2020
Passed my exam today with a score of 798. This is good material.
INDIA
upvote

Arron commented on January 26, 2020
This saved me so much time. The questions and answers are adequate and close to real exam. I like the PDF and its format. Just put it on my iPad and studied while traveling to work. This was my first time using this site and I am pretty happy about their service and price.
GERMANY
upvote

Suresh commented on April 17, 2019
This download is a waste of time . I downloaded the windows app and installed and it is asking to load the test. No documentation provided on how to use the desk top tool. Unable to install on my MAC not Iphone compatible. RE- Admin: Suresh, our website clearly says that the Test Engine software is for Windows only. We have not advertised anywhere in our website saying the Test Engine Software is for MAC as well.
UNITED STATES
upvote