ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 04.05.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 04.05.2025
An organization requires a third party for processing customer personal data.
Which of the following is the BEST approach when sharing data over a public network?
- A . Include a nondisclosure agreement (NDA) for personal data in the contract.
- B . Implement a digital rights protection tool to monitor data.
- C . Use a virtual private network (VPN) to communicate data.
- D . Transfer a read-only version of the data.
Which of the following MOST effectively limits the impact of a ransomware attack?
- A . Cyber insurance
- B . Cryptocurrency reserve
- C . Data backups
- D . End user training
Following a review of a third-party vendor, it is MOST important for an organization to ensure:
- A . results of the review are accurately reported to management.
- B . identified findings are reviewed by the organization.
- C . results of the review are validated by internal audit.
- D . identified findings are approved by the vendor.
Which of the following should be of GREATEST concern lo a risk practitioner reviewing the implementation of an emerging technology?
- A . Lack of alignment to best practices
- B . Lack of risk assessment
- C . Lack of risk and control procedures
- D . Lack of management approval
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
- A . Approving operational strategies and objectives
- B . Monitoring the results of actions taken to mitigate risk
- C . Ensuring the effectiveness of the risk management program
- D . Ensuring risk scenarios are identified and recorded in the risk register
A penetration test reveals several vulnerabilities in a web-facing application.
Which of the following should be the FIRST step in selecting a risk response?
- A . Correct the vulnerabilities to mitigate potential risk exposure.
- B . Develop a risk response action plan with key stakeholders.
- C . Assess the level of risk associated with the vulnerabilities.
- D . Communicate the vulnerabilities to the risk owner.
A recent regulatory requirement has the potential to affect an organization’s use of a third party to supply outsourced business services.
Which of the following is the BEST course of action?
- A . Conduct a gap analysis.
- B . Terminate the outsourcing agreement.
- C . Identify compensating controls.
- D . Transfer risk to the third party.
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
- A . Internal auditor
- B . Asset owner
- C . Finance manager
- D . Control owner
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
- A . To measure business exposure to risk
- B . To identify control vulnerabilities
- C . To monitor the achievement of set objectives
- D . To raise awareness of operational issues
The software version of an enterprise’s critical business application has reached end-of-life and is no longer supported by the vendor. IT has decided to develop an in-house replacement application.
Which of the following should be the PRIMARY concern?
- A . The system documentation is not available.
- B . Enterprise risk management (ERM) has not approved the decision.
- C . The board of directors has not approved the decision.
- D . The business process owner is not an active participant.