ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
Which of the following BEST indicates the effective implementation of a risk treatment plan?
- A . Inherent risk is managed within an acceptable level.
- B . Residual risk is managed within appetite and tolerance.
- C . Risk treatments are aligned with industry peers.
- D . Key controls are identified and documented.
Which of the following is MOST helpful in preventing risk events from materializing?
- A . Prioritizing and tracking issues
- B . Establishing key risk indicators (KRIs)
- C . Reviewing and analyzing security incidents
- D . Maintaining the risk register
Who is the BEST person to the employee personal data?
- A . Human resources (HR) manager
- B . System administrator
- C . Data privacy manager
- D . Compliance manager
A recent vulnerability assessment of a web-facing application revealed several weaknesses.
Which of the following should be done NEXT to determine the risk exposure?
- A . Code review
- B . Penetration test
- C . Gap assessment
- D . Business impact analysis (BIA)
In order to determining a risk is under-controlled the risk practitioner will need to
- A . understand the risk tolerance
- B . monitor and evaluate IT performance
- C . identify risk management best practices
- D . determine the sufficiency of the IT risk budget
Which of the following is the MOST reliable validation of a new control?
- A . Approval of the control by senior management
- B . Complete and accurate documentation of control objectives
- C . Control owner attestation of control effectiveness
- D . Internal audit review of control design
Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:
- A . accountable for the affected processes.
- B . members of senior management.
- C . authorized to select risk mitigation options.
- D . independent from the business operations.
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses.
What should be done NEXT in response to this report?
- A . Migrate all data to another compliant service provider.
- B . Analyze the impact of the provider’s control weaknesses to the business.
- C . Conduct a follow-up audit to verify the provider’s control weaknesses.
- D . Review the contract to determine if penalties should be levied against the provider.
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
- A . Risk register
- B . Risk appetite
- C . Risk priorities
- D . Risk heat maps
Which of the following activities BEST facilitates effective risk management throughout the organization?
- A . Reviewing risk-related process documentation
- B . Conducting periodic risk assessments
- C . Performing a business impact analysis (BIA)
- D . Performing frequent audits