ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 04.05.2025- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 04.05.2025
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization’s risk register?
- A . Limit access to senior management only.
- B . Encrypt the risk register.
- C . Implement role-based access.
- D . Require users to sign a confidentiality agreement.
Which of the following is the FIRST step when developing a business case to drive the adoption of a risk remediation project by senior management?
- A . Calculating the cost
- B . Analyzing cost-effectiveness
- C . Determining the stakeholders
- D . Identifying the objectives
When updating the risk register after a risk assessment, which of the following is MOST important to include?
- A . Historical losses due to past risk events
- B . Cost to reduce the impact and likelihood
- C . Likelihood and impact of the risk scenario
- D . Actor and threat type of the risk scenario
Which of the following is the PRIMARY reason for a risk practitioner to review an organization’s IT asset inventory?
- A . To plan for the replacement of assets at the end of their life cycles
- B . To assess requirements for reducing duplicate assets
- C . To understand vulnerabilities associated with the use of the assets
- D . To calculate mean time between failures (MTBF) for the assets
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
- A . Providing assurance of control effectiveness
- B . Implementing internal controls
- C . Monitoring risk responses
- D . Applying risk treatments
When updating a risk register with the results of an IT risk assessment, the risk practitioner should log:
- A . high impact scenarios.
- B . high likelihood scenarios.
- C . treated risk scenarios.
- D . known risk scenarios.
Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?
- A . It facilitates the use of a framework for risk management.
- B . It establishes a means for senior management to formally approve risk practices.
- C . It encourages risk-based decision making for stakeholders.
- D . It provides a basis for benchmarking against industry standards.
During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures.
Which of the following should the risk practitioner do FIRST?
- A . Report the infraction.
- B . Perform a risk assessment.
- C . Conduct risk awareness training.
- D . Discontinue the process.
The PRIMARY advantage of implementing an IT risk management framework is the:
- A . establishment of a reliable basis for risk-aware decision making.
- B . compliance with relevant legal and regulatory requirements.
- C . improvement of controls within the organization and minimized losses.
- D . alignment of business goals with IT objectives.
Which of the following BEST enables the timely detection of changes in the security control environment?
- A . Control self-assessment (CSA)
- B . Log analysis
- C . Security control reviews
- D . Random sampling checks