Domain 4: Technology and Security

Technology and Information Security Principles.

Addresses Technology Principles (Roadmaps, Operations, SDLC, Data Lifecycle, Project Mgmt, Resilience) and Information Security Principles (Concepts, Awareness, Privacy).
5 minutes 5 Questions

CRISC Domain 4, titled 'Information Technology and Security,' represents the operational execution and monitoring phase of the risk management lifecycle. While earlier domains establish governance and assess risks, Domain 4 focuses on ensuring that the internal controls selected to mitigate those r…

Concepts covered: Technology Roadmaps and Enterprise Architecture, Operations Management, System Development Life Cycle (SDLC), Data Lifecycle Management, Portfolio and Project Management, Technology Resilience and Disaster Recovery, Emerging Technologies, Security Concepts, Frameworks, and Standards, Security/Risk Awareness and Training, Data Privacy and Data Protection Principles

Test mode:
CRISC - Domain 4: Technology and Security Example Questions

Test your knowledge of Domain 4: Technology and Security

Question 1

An IS risk practitioner is advising on the release of statistical health data to external researchers. The risk assessment identifies a 'membership inference' vulnerability where an attacker could potentially deduce if a specific patient is included in the dataset by analyzing the output. Which privacy-enhancing technology provides the mathematical assurance necessary to neutralize this specific risk?

Question 2

A risk practitioner is advising the Project Management Office (PMO) on the composition of the IT portfolio. Which approach best enables the identification and management of systemic risks arising from project interdependencies?

Question 3

An enterprise utilizes a high-velocity continuous deployment strategy, releasing software updates multiple times daily. The incident response team, however, frequently struggles to diagnose production failures because the Configuration Management Database (CMDB) reflects obsolete state data, despite being updated by a weekly automated discovery scan. Which integration mechanism best resolves this visibility gap while maintaining operational agility?

More Domain 4: Technology and Security questions
298 questions (total)