ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
- A . Identifying critical information assets
- B . Identifying events impacting continuity of operations;
- C . Creating a data classification scheme
- D . Analyzing previous risk assessment results
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
- A . Risk magnitude
- B . Incident probability
- C . Risk appetite
- D . Cost-benefit analysis
During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards.
The overall control environment may still be effective if:
- A . compensating controls are in place.
- B . a control mitigation plan is in place.
- C . risk management is effective.
- D . residual risk is accepted.
Which of the following approaches would BEST help to identify relevant risk scenarios?
- A . Engage line management in risk assessment workshops.
- B . Escalate the situation to risk leadership.
- C . Engage internal audit for risk assessment workshops.
- D . Review system and process documentation.
Which of the following is the GREATEST risk associated with an environment that lacks documentation of the architecture?
- A . Unknown vulnerabilities
- B . Legacy technology systems
- C . Network isolation
- D . Overlapping threats
Which of the following is the BEST approach for obtaining management buy-in to implement additional IT controls?
- A . List requirements based on a commonly accepted IT risk management framework.
- B . Provide information on new governance, risk, and compliance (GRC) platform functionalities.
- C . Describe IT risk impact on organizational processes in monetary terms.
- D . Present new key risk indicators (KRIs) based on industry benchmarks.
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
- A . Cost-benefit analysis
- B . Risk tolerance
- C . Known vulnerabilities
- D . Cyber insurance
An organization with a large number of applications wants to establish a security risk assessment program.
Which of the following would provide the MOST useful information when determining the frequency of risk assessments?
- A . Feedback from end users
- B . Results of a benchmark analysis
- C . Recommendations from internal audit
- D . Prioritization from business owners
The PRIMARY objective of a risk identification process is to:
- A . evaluate how risk conditions are managed.
- B . determine threats and vulnerabilities.
- C . estimate anticipated financial impact of risk conditions.
- D . establish risk response options.
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
- A . Monitoring risk responses
- B . Applying risk treatments
- C . Implementing internal controls
- D . Providing assurance of control effectiveness