ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 08.09.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 08.09.2025
Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?
- A . Privacy risk controls
- B . Business continuity
- C . Risk taxonomy
- D . Management support
Which of the following is the BEST way to identify changes in the risk profile of an organization?
- A . Monitor key risk indicators (KRIs).
- B . Monitor key performance indicators (KPIs).
- C . Interview the risk owner.
- D . Conduct a gap analysis
Which of the following scenarios represents a threat?
- A . Connecting a laptop to a free, open, wireless access point (hotspot)
- B . Visitors not signing in as per policy
- C . Storing corporate data in unencrypted form on a laptop
- D . A virus transmitted on a USB thumb drive
Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?
- A . System owner
- B . Internal auditor
- C . Process owner
- D . Risk owner
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard.
Which risk treatment was adopted by the organization?
- A . Acceptance
- B . Transfer
- C . Mitigation
- D . Avoidance
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented.
Which risk treatment has been selected?
- A . Avoidance
- B . Acceptance
- C . Mitigation
- D . Transfer
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management.
The BEST way to support risk-based decisions by senior management would be to:
- A . map findings to objectives.
- B . provide quantified detailed analysis
- C . recommend risk tolerance thresholds.
- D . quantify key risk indicators (KRls).
Which of the following activities is PRIMARILY the responsibility of senior management?
- A . Bottom-up identification of emerging risks
- B . Categorization of risk scenarios against a standard taxonomy
- C . Prioritization of risk scenarios based on severity
- D . Review of external loss data
An organization’s recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis.
Which of the following is the MOST likely cause of this situation?
- A . Failure to test the disaster recovery plan (DRP)
- B . Lack of well-documented business impact analysis (BIA)
- C . Lack of annual updates to the disaster recovery plan (DRP)
- D . Significant changes in management personnel
Which of the following is the MOST effective way to help ensure accountability for managing risk?
- A . Assign process owners to key risk areas.
- B . Obtain independent risk assessments.
- C . Assign incident response action plan responsibilities.
- D . Create accurate process narratives.