ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 06.09.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 06.09.2025
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
- A . perform a business impact analysis.
- B . identify potential sources of risk.
- C . establish risk guidelines.
- D . understand control design.
An organization is analyzing the risk of shadow IT usage.
Which of the following is the MOST important input into the assessment?
- A . Business benefits of shadow IT
- B . Application-related expresses
- C . Classification of the data
- D . Volume of data
Which of the following is the MOST important success factor when introducing risk management in an organization?
- A . Implementing a risk register
- B . Defining a risk mitigation strategy and plan
- C . Assigning risk ownership
- D . Establishing executive management support
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program.
The PRIMARY goal of this program should be to:
- A . reduce the risk to an acceptable level.
- B . communicate the consequences for violations.
- C . implement industry best practices.
- D . reduce the organization’s risk appetite
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
- A . Digital signature
- B . Edit checks
- C . Encryption
- D . Multifactor authentication
A newly hired risk practitioner finds that the risk register has not been updated in the past year.
What is the risk practitioner’s BEST course of action?
- A . Identify changes in risk factors and initiate risk reviews.
- B . Engage an external consultant to redesign the risk management process.
- C . Outsource the process for updating the risk register.
- D . Implement a process improvement and replace the old risk register.
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization’s security incident handling process?
- A . The number of security incidents escalated to senior management
- B . The number of resolved security incidents
- C . The number of newly identified security incidents
- D . The number of recurring security incidents
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
- A . Frequency of business continuity plan (BCP) lasting
- B . Frequency and number of new software releases
- C . Frequency and duration of unplanned downtime
- D . Number of IT support staff available after business hours
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
- A . Number of users who have signed a BYOD acceptable use policy
- B . Number of incidents originating from BYOD devices
- C . Budget allocated to the BYOD program security controls
- D . Number of devices enrolled in the BYOD program
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
- A . Number of users who have signed a BYOD acceptable use policy
- B . Number of incidents originating from BYOD devices
- C . Budget allocated to the BYOD program security controls
- D . Number of devices enrolled in the BYOD program