ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 05.06.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 05.06.2025
Which of the following is MOST important when developing risk scenarios?
- A . The scenarios are based on industry best practice.
- B . The scenarios focus on current vulnerabilities.
- C . The scenarios are relevant to the organization.
- D . The scenarios include technical consequences.
The risk associated with a high-risk vulnerability in an application is owned by the:
- A . security department.
- B . business unit
- C . vendor.
- D . IT department.
The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:
- A . results of a business impact analysis (BIA).
- B . the original risk response plan.
- C . training program and user awareness documentation.
- D . a post-implementation risk and control self-assessment (RCSA).
Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?
- A . Enable data wipe capabilities
- B . Penetration testing and session timeouts
- C . Implement remote monitoring
- D . Enforce strong passwords and data encryption
Which of the following should be a risk practitioner’s NEXT step after learning of an incident that has affected a competitor?
- A . Activate the incident response plan.
- B . Implement compensating controls.
- C . Update the risk register.
- D . Develop risk scenarios.
An organization is measuring the effectiveness of its change management program to reduce the number of unplanned production changes.
Which of the following would be the BEST metric to determine if the program is performing as expected?
- A . Decrease in the time to move changes to production
- B . Ratio of emergency fixes to total changes
- C . Ratio of system changes to total changes
- D . Decrease in number of changes without a fallback plan
Which of the following BEST enables the identification of trends in risk levels?
- A . Correlation between risk levels and key risk indicators (KRIs) is positive.
- B . Measurements for key risk indicators (KRIs) are repeatable
- C . Quantitative measurements are used for key risk indicators (KRIs).
- D . Qualitative definitions for key risk indicators (KRIs) are used.
Which of the following BEST enables effective risk-based decision making?
- A . Performing threat modeling to understand the threat landscape
- B . Minimizing the number of risk scenarios for risk assessment
- C . Aggregating risk scenarios across a key business unit
- D . Ensuring the risk register is updated to reflect changes in risk factors
The maturity of an IT risk management program is MOST influenced by:
- A . the organization’s risk culture
- B . benchmarking results against similar organizations
- C . industry-specific regulatory requirements
- D . expertise available within the IT department
Which of the following situations would BEST justify escalation to senior management?
- A . Residual risk exceeds acceptable limits.
- B . Residual risk is inadequately recorded.
- C . Residual risk remains after controls have been applied.
- D . Residual risk equals current risk.