ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 04.09.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 04.09.2025
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?
- A . Frequency of anti-virus software updates
- B . Number of alerts generated by the anti-virus software
- C . Number of false positives detected over a period of time
- D . Percentage of IT assets with current malware definitions
The acceptance of control costs that exceed risk exposure is MOST likely an example of:
- A . low risk tolerance.
- B . corporate culture misalignment.
- C . corporate culture alignment.
- D . high risk tolerance
Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?
- A . To ensure risk owners understand their responsibilities
- B . To ensure IT risk is managed within acceptable limits
- C . To ensure the organization complies with legal requirements
- D . To ensure the IT risk awareness program is effective
Which element of an organization’s risk register is MOST important to update following the commissioning of a new financial reporting system?
- A . Key risk indicators (KRIs)
- B . The owner of the financial reporting process
- C . The risk rating of affected financial processes
- D . The list of relevant financial controls
It is MOST important to the effectiveness of an IT risk management function that the associated processes are:
- A . aligned to an industry-accepted framework.
- B . reviewed and approved by senior management.
- C . periodically assessed against regulatory requirements.
- D . updated and monitored on a continuous basis.
Which of the following BEST assists in justifying an investment in automated controls?
- A . Cost-benefit analysis
- B . Alignment of investment with risk appetite
- C . Elimination of compensating controls
- D . Reduction in personnel costs
The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:
- A . the third-party website manager
- B . the business process owner
- C . IT security
- D . the compliance manager
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
- A . network operations.
- B . the cybersecurity function.
- C . application development.
- D . the business function.
Which of the following is MOST important for senior management to review during an acquisition?
- A . Risk appetite and tolerance
- B . Risk framework and methodology
- C . Key risk indicator (KRI) thresholds
- D . Risk communication plan
Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST
- A . review the key risk indicators.
- B . conduct a risk analysis.
- C . update the risk register
- D . reallocate risk response resources.