ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 10.03.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.03.2026
When reporting on the performance of an organization’s control environment including which of the following would BEST inform stakeholders risk decision-making?
- A . The audit plan for the upcoming period
- B . Spend to date on mitigating control implementation
- C . A report of deficiencies noted during controls testing
- D . A status report of control deployment
A risk practitioner has been notified that an employee sent an email in error containing customers‘ personally identifiable information (Pll).
Which of the following is the risk practitioner’s BEST course of action?
- A . Report it to the chief risk officer.
- B . Advise the employee to forward the email to the phishing team.
- C . follow incident reporting procedures.
- D . Advise the employee to permanently delete the email.
Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?
- A . Re-evaluate current controls.
- B . Revise the current risk action plan.
- C . Escalate the risk to senior management.
- D . Implement additional controls.
Which of the following is MOST important to identify when developing generic risk scenarios?
- A . The organization’s vision and mission
- B . Resources required for risk mitigation
- C . Impact to business objectives
- D . Risk-related trends within the industry
An organization has outsourced its billing function to an external service provider.
Who should own the risk of customer data leakage caused by the service provider?
- A . The service provider
- B . Vendor risk manager
- C . Legal counsel
- D . Business process owner
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
- A . Deleting the data from the file system
- B . Cryptographically scrambling the data
- C . Formatting the cloud storage at the block level
- D . Degaussing the cloud storage media
A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls.
Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?
- A . Identify previous data breaches using the startup company’s audit reports.
- B . Have the data privacy officer review the startup company’s data protection policies.
- C . Classify and protect the data according to the parent company’s internal standards.
- D . Implement a firewall and isolate the environment from the parent company’s network.
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
- A . Source information is acquired at stable cost.
- B . Source information is tailored by removing outliers.
- C . Source information is readily quantifiable.
- D . Source information is consistently available.
Which of the following is the PRIMARY consideration when establishing an organization’s risk management methodology?
- A . Business context
- B . Risk tolerance level
- C . Resource requirements
- D . Benchmarking information
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
- A . Scalable infrastructure
- B . A hot backup site
- C . Transaction limits
- D . Website activity monitoring