ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 05.06.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 05.06.2025
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
- A . Key risk indicators (KRIs)
- B . Data backups
- C . Incident response plan
- D . Cyber insurance
Which of the following is the BEST indicator of an effective IT security awareness program?
- A . Decreased success rate of internal phishing tests
- B . Decreased number of reported security incidents
- C . Number of disciplinary actions issued for security violations
- D . Number of employees that complete security training
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
- A . control is ineffective and should be strengthened
- B . risk is inefficiently controlled.
- C . risk is efficiently controlled.
- D . control is weak and should be removed.
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
- A . The business case for the use of loT
- B . The loT threat landscape
- C . Policy development for loT
- D . The network that loT devices can access
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
- A . IT service desk manager
- B . Sales manager
- C . Customer service manager
- D . Access control manager
Risk management strategies are PRIMARILY adopted to:
- A . take necessary precautions for claims and losses.
- B . achieve acceptable residual risk levels.
- C . avoid risk for business and IT assets.
- D . achieve compliance with legal requirements.
Deviation from a mitigation action plan’s completion date should be determined by which of the following?
- A . Change management as determined by a change control board
- B . Benchmarking analysis with similar completed projects
- C . Project governance criteria as determined by the project office
- D . The risk owner as determined by risk management processes
Which of the following would BEST ensure that identified risk scenarios are addressed?
- A . Reviewing the implementation of the risk response
- B . Creating a separate risk register for key business units
- C . Performing real-time monitoring of threats
- D . Performing regular risk control self-assessments
Which of the following is the GREATEST concern associated with business end users developing their own applications on end user spreadsheets and database programs?
- A . An IT project manager is not assigned to oversee development.
- B . Controls are not applied to the applications.
- C . There is a lack of technology recovery options.
- D . The applications are not captured in the risk profile.
An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application.
Which of the following should be the NEXT course of action?
- A . Invoke the disaster recovery plan during an incident.
- B . Prepare a cost-benefit analysis of alternatives available
- C . Implement redundant infrastructure for the application.
- D . Reduce the recovery time by strengthening the response team.