ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 10.03.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.03.2026
An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite.
Which of the following is the risk practitioner’s MOST important action related to this decision?
- A . Recommend risk remediation
- B . Change the level of risk appetite
- C . Document formal acceptance of the risk
- D . Reject the business initiative
During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?
- A . Business process owners
- B . Business process consumers
- C . Application architecture team
- D . Internal audit
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees.
Which of the following is the GREATEST concern with this finding?
- A . Insufficient laptops for existing employees
- B . Abuse of leavers‘ account privileges
- C . Unauthorized access to organizational data
- D . Financial cost of replacing the laptops
A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments.
Which of the following i the BEST recommendation to address this situation?
- A . Enable data encryption in the test environment
- B . Implement equivalent security in the test environment.
- C . Prevent the use of production data for test purposes
- D . Mask data before being transferred to the test environment.
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
- A . An acceptable use policy for personal devices
- B . Required user log-on before synchronizing data
- C . Enforced authentication and data encryption
- D . Security awareness training and testing
An organization has detected unauthorized logins to its client database servers.
Which of the following should be of GREATEST concern?
- A . Potential increase in regulatory scrutiny
- B . Potential system downtime
- C . Potential theft of personal information
- D . Potential legal risk
Which of the following should be the PRIMARY driver for the prioritization of risk responses?
- A . Residual risk
- B . Risk appetite
- C . Mitigation cost
- D . Inherent risk
An organization practices the principle of least privilege.
To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:
- A . business purpose documentation and software license counts
- B . an access control matrix and approval from the user’s manager
- C . documentation indicating the intended users of the application
- D . security logs to determine the cause of invalid login attempts
Which of the following will BEST support management repotting on risk?
- A . Risk policy requirements
- B . A risk register
- C . Control self-assessment
- D . Key performance Indicators
Which of the following should be the HIGHEST priority when developing a risk response?
- A . The risk response addresses the risk with a holistic view.
- B . The risk response is based on a cost-benefit analysis.
- C . The risk response is accounted for in the budget.
- D . The risk response aligns with the organization’s risk appetite.