Free CRISC Exam Braindumps (page: 12)

Page 11 of 451

Which of the following controls do NOT come under technical class of control?

  1. Program management control
  2. System and Communications Protection control
  3. Identification and Authentication control
  4. Access Control

Answer(s): A

Explanation:

Program Management control comes under management class of controls, not technical.
Program Management control is driven by the Federal Information Security Management Act (FISMA). It provides controls to ensure compliance with FISMA. These controls complement other controls. They don't replace them.

Incorrect Answers:
B, C, D: These controls comes under technical class of control.

The Technical class of controls includes four families. These families include over 75 individual controls. Following is a list of each of the families in the Technical class:
Access Control (AC): This family of controls helps an organization implement effective access control. They ensure that users have the rights and permissions they need to perform their jobs, and no more. It includes principles such as least privilege and separation of duties.
Audit and Accountability (AU): This family of controls helps an organization implement an effective audit program. It provides details on how to determine what to audit. It provides details on how to protect the audit logs. It also includes information on using audit logs for non-repudiation.
Identification and Authentication (IA): These controls cover different practices to identify and authenticate users. Each user should be uniquely identified. In other words, each user has one account. This account is only used by one user. Similarly, device identifiers uniquely identify devices on the network.
System and Communications Protection (SC): The SC family is a large group of controls that cover many aspects of protecting systems and communication channels. Denial of service protection and boundary protection controls are included. Transmission integrity and confidentiality controls are also included.



Mary is a project manager in her organization. On her current project she is working with her project team and other key stakeholders to identify the risks within the project. She is currently aiming to create a comprehensive list of project risks so she is using a facilitator to help generate ideas about project risks. What risk identification method is Mary likely using?

  1. Delphi Techniques
  2. Expert judgment
  3. Brainstorming
  4. Checklist analysis

Answer(s): C

Explanation:

Mary is using brainstorming in this example. Brainstorming attempts to create a comprehensive list of risks and often is led by a moderator or facilitator to move the process along.
Brainstorming is a technique to gather general data. It can be used to identify risks, ideas, or solutions to issues by using a group of team members or subject-matter expert. Brainstorming is a group creativity technique that also provides other benefits, such as boosting morale, enhancing work enjoyment, and improving team work.

Incorrect Answers:
A: The Delphi technique uses rounds of anonymous surveys to generate a consensus on the identified risks.

B: Expert judgment is not the best answer for this; projects experts generally do the risk identification, in addition to the project team.

D: Checklist analysis uses historical information and information from similar projects within the organization's experience.



Which of the following is an administrative control?

  1. Water detection
  2. Reasonableness check
  3. Data loss prevention program
  4. Session timeout

Answer(s): C



You are the project manager of the NHH Project. You are working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team. What document do you and your team is creating in this scenario?

  1. Project plan
  2. Resource management plan
  3. Project management plan
  4. Risk management plan

Answer(s): D

Explanation:

The risk management plan, part of the comprehensive management plan, defines how risks will be identified, analyzed, monitored and controlled, and even responded to.

A Risk management plan is a document arranged by a project manager to estimate the effectiveness, predict risks, and build response plans to mitigate them. It also consists of the risk assessment matrix.

Risks are built in with any project, and project managers evaluate risks repeatedly and build plans to address them. The risk management plan consists of analysis of possible risks with both high and low impacts, and the mitigation strategies to facilitate the project and avoid being derailed through which the common problems arise. Risk management plans should be timely reviewed by the project team in order to avoid having the analysis become stale and not reflective of actual potential project risks. Most critically, risk management plans include a risk strategy for project execution.

Incorrect Answers:
A: The project plan is not an official PMBOK project management plan.

B: The resource management plan defines the management of project resources, such as project team members, facilities, equipment, and contractors.

C: The project management plan is a comprehensive plan that communicates the intent of the project for all project management knowledge areas.






Post your Comments and Discuss ISACA CRISC exam with other Community members:

CRISC Discussions & Posts