ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 10.03.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.03.2026
What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?
- A . Mitigation and control value
- B . Volume and scope of data generated daily
- C . Business criticality and sensitivity
- D . Recovery point objective (RPO) and recovery time objective (RTO)
Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?
- A . To enhance compliance with standards
- B . To minimize subjectivity of assessments
- C . To increase consensus among peers
- D . To provide assessments for benchmarking
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization’s enterprise resource planning (ERP) system.
What is the BEST way to reduce this risk going forward?
- A . Align applications to business processes.
- B . Implement an enterprise architecture (EA).
- C . Define the software development life cycle (SDLC).
- D . Define enterprise-wide system procurement requirements.
Which of the following is the BEST way to detect zero-day malware on an end user’s workstation?
- A . An antivirus program
- B . Database activity monitoring
- C . Firewall log monitoring
- D . File integrity monitoring
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
- A . a process for measuring and reporting control performance.
- B . an alternate control design in case of failure of the identified control.
- C . a process for bypassing control procedures in case of exceptions.
- D . procedures to ensure the effectiveness of the control.
The BEST use of key risk indicators (KRIs) is to provide:
- A . Early indication of increasing exposure to a specific risk.
- B . Lagging indication of major information security incidents.
- C . Early indication of changes to required risk response.
- D . Insight into the performance of a monitored process.
Within the three lines of defense model, the responsibility for managing risk and controls resides with:
- A . operational management.
- B . the risk practitioner.
- C . the internal auditor.
- D . executive management.
Which of the following resources is MOST helpful when creating a manageable set of IT risk
scenarios?
- A . Results of current and past risk assessments
- B . Organizational strategy and objectives
- C . Lessons learned from materialized risk scenarios
- D . Internal and external audit findings
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
- A . data aggregation
- B . data privacy
- C . data quality
- D . data validation
The MAIN goal of the risk analysis process is to determine the:
- A . potential severity of impact
- B . frequency and magnitude of loss
- C . control deficiencies
- D . threats and vulnerabilities