ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 10.03.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.03.2026
A risk practitioner notices a risk scenario associated with data loss at the organization’s cloud provider is assigned to the provider who should the risk scenario be reassigned to.
- A . Senior management
- B . Chief risk officer (CRO)
- C . Vendor manager
- D . Data owner
Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?
- A . To build an organizational risk-aware culture
- B . To continuously improve risk management processes
- C . To comply with legal and regulatory requirements
- D . To identify gaps in risk management practices
Which of the following would BEST prevent an unscheduled application of a patch?
- A . Network-based access controls
- B . Compensating controls
- C . Segregation of duties
- D . Change management
A PRIMARY function of the risk register is to provide supporting information for the development of an organization’s risk:
- A . strategy.
- B . profile.
- C . process.
- D . map.
Which of the following would MOST likely cause a risk practitioner to reassess risk scenarios?
- A . A change in the risk management policy
- B . A major security incident
- C . A change in the regulatory environment
- D . An increase in intrusion attempts
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house.
How should the risk treatment response be reflected in the risk register?
- A . Risk mitigation
- B . Risk avoidance
- C . Risk acceptance
- D . Risk transfer
Who should have the authority to approve an exception to a control?
- A . information security manager
- B . Control owner
- C . Risk owner
- D . Risk manager
Which of the following is the BEST indication of a mature organizational risk culture?
- A . Corporate risk appetite is communicated to staff members.
- B . Risk owners understand and accept accountability for risk.
- C . Risk policy has been published and acknowledged by employees.
- D . Management encourages the reporting of policy breaches.
An organization has established workflows in its service desk to support employee reports of security-related concerns.
Which of the following is the MOST efficient approach to analyze these concerns?
- A . Map concerns to organizational assets.
- B . Sort concerns by likelihood.
- C . Align concerns to key vendors.
- D . Prioritize concerns based on frequency of reports.
When of the following provides the MOST tenable evidence that a business process control is effective?
- A . Demonstration that the control is operating as designed
- B . A successful walk-through of the associated risk assessment
- C . Management attestation that the control is operating effectively
- D . Automated data indicating that risk has been reduced