ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 04.09.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 04.09.2025
Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization’s current risk profile?
- A . Hire consultants specializing m the new technology.
- B . Review existing risk mitigation controls.
- C . Conduct a gap analysis.
- D . Perform a risk assessment.
Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?
- A . The costs associated with mitigation options
- B . The status of identified risk scenarios
- C . The cost-benefit analysis of each risk response
- D . The timeframes for risk response actions
Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?
- A . Aligning IT with short-term and long-term goals of the organization
- B . Ensuring the IT budget and resources focus on risk management
- C . Ensuring senior management’s primary focus is on the impact of identified risk
- D . Prioritizing internal departments that provide service to customers
An organization is planning to acquire a new financial system.
Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?
- A . Project sponsor
- B . Process owner
- C . Risk manager
- D . Internal auditor
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization’s existing controls?
- A . Senior management has approved the control design.
- B . Inherent risk has been reduced from original levels.
- C . Residual risk remains within acceptable levels.
- D . Costs for control maintenance are reasonable.
Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?
- A . Data security
- B . Recovery costs
- C . Business disruption
- D . Recovery resource availability
Which of the following represents a vulnerability?
- A . An identity thief seeking to acquire personal financial data from an organization
- B . Media recognition of an organization’s market leadership in its industry
- C . A standard procedure for applying software patches two weeks after release
- D . An employee recently fired for insubordination
The BEST way for an organization to ensure that servers are compliant to security policy is to review:
- A . change logs.
- B . configuration settings.
- C . server access logs.
- D . anti-malware compliance.
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
- A . prepare a follow-up risk assessment.
- B . recommend acceptance of the risk scenarios.
- C . reconfirm risk tolerance levels.
- D . analyze changes to aggregate risk.
To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:
- A . risk mitigation approach
- B . cost-benefit analysis.
- C . risk assessment results.
- D . vulnerability assessment results