ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 10.03.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 10.03.2026
Which of the following should a risk practitioner do FIRST to support the implementation of governance around organizational assets within an enterprise risk management (ERM) program?
- A . Develop a detailed risk profile.
- B . Hire experienced and knowledgeable resources.
- C . Schedule internal audits across the business.
- D . Conduct risk assessments across the business.
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan“
- A . To ensure completion of the risk assessment cycle
- B . To ensure controls arc operating effectively
- C . To ensure residual risk Is at an acceptable level
- D . To ensure control costs do not exceed benefits
An organization has implemented a policy requiring staff members to take a minimum of five consecutive days‘ leave per year to mitigate the risk of malicious insider activities.
Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
- A . Financial loss incurred due to malicious activities since policy implementation
- B . Average number of consecutive days of leave per staff member
- C . Number of suspected malicious activities reported since policy implementation
- D . Percentage of staff turnover following five consecutive days of leave
Which of the following is the BEST approach for selecting controls to minimize risk?
- A . Industry best practice review
- B . Risk assessment
- C . Cost-benefit analysis
- D . Control-effectiveness evaluation
Which of the following BEST protects organizational data within a production cloud environment?
- A . Data encryption
- B . Continuous log monitoring
- C . Right to audit
- D . Data obfuscation
Which of the following would MOST likely result in updates to an IT risk appetite statement?
- A . External audit findings
- B . Feedback from focus groups
- C . Self-assessment reports
- D . Changes in senior management
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
- A . resources to monitor backups
- B . restoration monitoring reports
- C . backup recovery requests
- D . recurring restore failures
Which of the following would be considered a vulnerability?
- A . Delayed removal of employee access
- B . Authorized administrative access to HR files
- C . Corruption of files due to malware
- D . Server downtime due to a denial of service (DoS) attack
Which of the following will BEST help an organization select a recovery strategy for critical systems?
- A . Review the business impact analysis.
- B . Create a business continuity plan.
- C . Analyze previous disaster recovery reports.
- D . Conduct a root cause analysis.
It is MOST appropriate for changes to be promoted to production after they are:
- A . communicated to business management
- B . tested by business owners.
- C . approved by the business owner.
- D . initiated by business users.