ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 29.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 29.04.2026
Which of the following should be determined FIRST when a new security vulnerability is made public?
- A . Whether the affected technology is used within the organization
- B . Whether the affected technology is Internet-facing
- C . What mitigating controls are currently in place
- D . How pervasive the vulnerability is within the organization
Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?
- A . A control self-assessment
- B . A third-party security assessment report
- C . Internal audit reports from the vendor
- D . Service level agreement monitoring
Which of the following should be management’s PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
- A . Designing compensating controls
- B . Determining if KRIs have been updated recently
- C . Assessing the effectiveness of the incident response plan
- D . Determining what has changed in the environment
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
- A . Analyzing risk appetite and tolerance levels
- B . Assessing identified risk and recording results in the risk register
- C . Evaluating risk scenarios and assessing current controls
- D . Reviewing guidance from industry best practices and standards
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
- A . Lack of organizational policy regarding open source software
- B . Lack of reliability associated with the use of open source software
- C . Lack of monitoring over installation of open source software in the organization
- D . Lack of professional support for open source software
Which of the following is the BEST way to protect sensitive data from administrators within a public
cloud?
- A . Use an encrypted tunnel lo connect to the cloud.
- B . Encrypt the data in the cloud database.
- C . Encrypt physical hard drives within the cloud.
- D . Encrypt data before it leaves the organization.
Which of the following controls are BEST strengthened by a clear organizational code of ethics?
- A . Detective controls
- B . Administrative controls
- C . Technical controls
- D . Preventive controls
An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on the organization’s customers.
Which of the following is the BEST recommendation to mitigate privacy risk?
- A . Obfuscate the customers’ personal information.
- B . Require the business partner to delete personal information following the audit.
- C . Use a secure channel to transmit the files.
- D . Ensure the contract includes provisions for sharing personal information.
When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?
- A . Risk action plans and associated owners
- B . Recent audit and self-assessment results
- C . Potential losses compared to treatment cost
- D . A list of assets exposed to the highest risk
The MOST important reason to monitor key risk indicators (KRIs) is to help management:
- A . identity early risk transfer strategies.
- B . lessen the impact of realized risk.
- C . analyze the chain of risk events.
- D . identify the root cause of risk events.