ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 04.09.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 04.09.2025
An organization has determined a risk scenario is outside the defined risk tolerance level.
What should be the NEXT course of action?
- A . Develop a compensating control.
- B . Allocate remediation resources.
- C . Perform a cost-benefit analysis.
- D . Identify risk responses
Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?
- A . Disciplinary action
- B . A control self-assessment
- C . A review of the awareness program
- D . Root cause analysis
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
- A . List of recent incidents affecting industry peers
- B . Results of external attacks and related compensating controls
- C . Gaps between current and desired states of the control environment
- D . Review of leading IT risk management practices within the industry
Effective risk communication BEST benefits an organization by:
- A . helping personnel make better-informed decisions
- B . assisting the development of a risk register.
- C . improving the effectiveness of IT controls.
- D . increasing participation in the risk assessment process.
An organization uses a biometric access control system for authentication and access to its server room.
Which control type has been implemented?
- A . Detective
- B . Deterrent
- C . Preventive
- D . Corrective
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
- A . Risk and control ownership
- B . Senior management participation
- C . Business unit support
- D . Risk nomenclature and taxonomy
Which of the following will provide the BEST measure of compliance with IT policies?
- A . Evaluate past policy review reports.
- B . Conduct regular independent reviews.
- C . Perform penetration testing.
- D . Test staff on their compliance responsibilities.
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security.
Which of the following observations would be MOST relevant to escalate to senior management?
- A . An increase in attempted distributed denial of service (DDoS) attacks
- B . An increase in attempted website phishing attacks
- C . A decrease in achievement of service level agreements (SLAs)
- D . A decrease in remediated web security vulnerabilities
An audit reveals that there are changes in the environment that are not reflected in the risk profile.
Which of the following is the BEST course of action?
- A . Review the risk identification process.
- B . Inform the risk scenario owners.
- C . Create a risk awareness communication plan.
- D . Update the risk register.
Which of the following is the MOST relevant information to include in a risk management strategy?
- A . Quantified risk triggers
- B . Cost of controls
- C . Regulatory requirements
- D . Organizational goals