ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
The MAIN reason for prioritizing IT risk responses is to enable an organization to:
- A . determine the risk appetite.
- B . determine the budget.
- C . define key performance indicators (KPIs).
- D . optimize resource utilization.
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption.
Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
- A . Implement a tool to create and distribute violation reports
- B . Raise awareness of encryption requirements for sensitive data.
- C . Block unencrypted outgoing emails which contain sensitive data.
- D . Implement a progressive disciplinary process for email violations.
When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?
- A . Before defining a framework
- B . During the risk assessment
- C . When evaluating risk response
- D . When updating the risk register
Which of the following would BEST indicate to senior management that IT processes are improving?
- A . Changes in the number of security exceptions
- B . Changes to the structure of the risk register
- C . Changes in the number of intrusions detected
- D . Changes in the position in the maturity model
An organization has decided to use an external auditor to review the control environment of an outsourced service provider.
The BEST control criteria to evaluate the provider would be based on:
- A . a recognized industry control framework
- B . guidance provided by the external auditor
- C . the service provider’s existing controls
- D . The organization’s specific control requirements
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
- A . Cost of controls
- B . Risk tolerance
- C . Risk appetite
- D . Probability definition
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
- A . The vendor must provide periodic independent assurance reports.
- B . The vendor must host data in a specific geographic location.
- C . The vendor must be held liable for regulatory fines for failure to protect data.
- D . The vendor must participate in an annual vendor performance review.
Which strategy employed by risk management would BEST help to prevent internal fraud?
- A . Require control owners to conduct an annual control certification.
- B . Conduct regular internal and external audits on the systems supporting financial reporting.
- C . Ensure segregation of duties are implemented within key systems or processes.
- D . Require the information security officer to review unresolved incidents.
Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?
- A . Reviewing control objectives
- B . Aligning with industry best practices
- C . Consulting risk owners
- D . Evaluating KPIs in accordance with risk appetite
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
- A . Emerging risk must be continuously reported to management.
- B . New system vulnerabilities emerge at frequent intervals.
- C . The risk environment is subject to change.
- D . The information security budget must be justified.