ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?
- A . Update the risk register.
- B . Assign responsibility and accountability for the incident.
- C . Prepare a report for senior management.
- D . Avoid recurrence of the incident.
A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers.
Which of the following presents the GREATEST risk to the organization’s reputation?
- A . Third-party software is used for data analytics.
- B . Data usage exceeds individual consent.
- C . Revenue generated is not disclosed to customers.
- D . Use of a data analytics system is not disclosed to customers.
Which of the following is the FIRST step in risk assessment?
- A . Review risk governance
- B . Asset identification
- C . Identify risk factors
- D . Inherent risk identification
Which of the following is the FIRST step in risk assessment?
- A . Review risk governance
- B . Asset identification
- C . Identify risk factors
- D . Inherent risk identification
An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution.
Which of the following is MOST important to mitigate risk associated with data privacy?
- A . Secure encryption protocols are utilized.
- B . Multi-factor authentication is set up for users.
- C . The solution architecture is approved by IT.
- D . A risk transfer clause is included in the contact
Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?
- A . Failed login attempts
- B . Simulating a denial of service attack
- C . Absence of IT audit findings
- D . Penetration test
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
- A . A decrease in control layering effectiveness
- B . An increase in inherent risk
- C . An increase in control vulnerabilities
- D . An increase in the level of residual risk
An organization’s control environment is MOST effective when:
- A . controls perform as intended.
- B . controls operate efficiently.
- C . controls are implemented consistent
- D . control designs are reviewed periodically
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges.
This behavior BEST represents:
- A . a threat.
- B . a vulnerability.
- C . an impact
- D . a control.
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
- A . Regional competitors‘ policies and standards
- B . Ability to monitor and enforce compliance
- C . Industry-standard templates
- D . Differences in regulatory requirements