ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 10.03.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.03.2026
An organization uses a vendor to destroy hard drives.
Which of the following would BEST reduce the risk of data leakage?
- A . Require the vendor to degauss the hard drives
- B . Implement an encryption policy for the hard drives.
- C . Require confirmation of destruction from the IT manager.
- D . Use an accredited vendor to dispose of the hard drives.
A risk practitioner is reviewing a vendor contract and finds there is no clause to control privileged access to the organization’s systems by vendor employees.
Which of the following is the risk practitioner’s BEST course of action?
- A . Contact the control owner to determine if a gap in controls exists.
- B . Add this concern to the risk register and highlight it for management review.
- C . Report this concern to the contracts department for further action.
- D . Document this concern as a threat and conduct an impact analysis.
Which of the following is MOST important for a risk practitioner to ensure once a risk action plan has been completed?
- A . The risk owner has validated outcomes.
- B . The risk register has been updated.
- C . The control objectives are mapped to risk objectives.
- D . The requirements have been achieved.
Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?
- A . A companion of risk assessment results to the desired state
- B . A quantitative presentation of risk assessment results
- C . An assessment of organizational maturity levels and readiness
- D . A qualitative presentation of risk assessment results
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
- A . identification.
- B . treatment.
- C . communication.
- D . assessment
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall.
Which of the following controls has MOST likely been compromised?
- A . Data validation
- B . Identification
- C . Authentication
- D . Data integrity
While reviewing an organization’s monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially.
Which of the following would be the BEST approach for the risk practitioner to take?
- A . Temporarily suspend emergency changes.
- B . Document the control deficiency in the risk register.
- C . Conduct a root cause analysis.
- D . Continue monitoring change management metrics.
Which of the following is the GREATEST risk associated with inappropriate classification of data?
- A . Inaccurate record management data
- B . Users having unauthorized access to data
- C . Inaccurate recovery time objectives (RTOs)
- D . Lack of accountability for data ownership
Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s change management process?
- A . Increase in the frequency of changes
- B . Percent of unauthorized changes
- C . Increase in the number of emergency changes
- D . Average time to complete changes
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
- A . A third-party assessment report of control environment effectiveness must be provided at least annually.
- B . Incidents related to data toss must be reported to the organization immediately after they occur.
- C . Risk assessment results must be provided to the organization at least annually.
- D . A cyber insurance policy must be purchased to cover data loss events.