ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 05.06.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 05.06.2025
In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner’s BEST recommendation to further reduce the impact of ransomware attacks would be to implement:
- A . two-factor authentication.
- B . continuous data backup controls.
- C . encryption for data at rest.
- D . encryption for data in motion.
Which of the following is MOST important information to review when developing plans for using emerging technologies?
- A . Existing IT environment
- B . IT strategic plan
- C . Risk register
- D . Organizational strategic plan
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data.
Which of the following would be MOST impacted?
- A . Key risk indicators (KRls)
- B . Inherent risk
- C . Residual risk
- D . Risk appetite
Which risk response strategy could management apply to both positive and negative risk that has been identified?
- A . Transfer
- B . Accept
- C . Exploit
- D . Mitigate
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
- A . Risk owner
- B . Risk practitioner
- C . Compliance manager
- D . Control owner
A risk assessment has identified that an organization may not be in compliance with industry regulations.
The BEST course of action would be to:
- A . conduct a gap analysis against compliance criteria.
- B . identify necessary controls to ensure compliance.
- C . modify internal assurance activities to include control validation.
- D . collaborate with management to meet compliance requirements.
Which of the following poses the GREATEST risk to an organization’s operations during a major it transformation?
- A . Lack of robust awareness programs
- B . infrequent risk assessments of key controls
- C . Rapid changes in IT procedures
- D . Unavailability of critical IT systems
Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?
- A . Multi-factor authentication
- B . Role-based access controls
- C . Activation of control audits
- D . Acceptable use policies
An organization recently implemented a cybersecurity awareness program that includes phishing simulation exercises for all employees.
What type of control is being utilized?
- A . Preventive
- B . Detective
- C . Compensating
- D . Deterrent
A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage.
Which of the following is MOST likely to change as a result of this implementation?
- A . Risk likelihood
- B . Risk velocity
- C . Risk appetite
- D . Risk impact