ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
Who is the BEST person to an application system used to process employee personal data?
- A . Compliance manager
- B . Data privacy manager
- C . System administrator
- D . Human resources (HR) manager
Who should be responsible for strategic decisions on risk management?
- A . Chief information officer (CIO)
- B . Executive management team
- C . Audit committee
- D . Business process owner
Which of the following tools is MOST effective in identifying trends in the IT risk profile?
- A . Risk self-assessment
- B . Risk register
- C . Risk dashboard
- D . Risk map
A risk practitioner has determined that a key control does not meet design expectations.
Which of the following should be done NEXT?
- A . Document the finding in the risk register.
- B . Invoke the incident response plan.
- C . Re-evaluate key risk indicators.
- D . Modify the design of the control.
An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios.
Which of the following is the BEST course of action?
- A . Evaluate the organization’s existing data protection controls.
- B . Reassess the risk appetite and tolerance levels of the business.
- C . Evaluate the sensitivity of data that the business needs to handle.
- D . Review the organization’s data retention policy and regulatory requirements.
When assessing the maturity level of an organization’s risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?
- A . Unclear organizational risk appetite
- B . Lack of senior management participation
- C . Use of highly customized control frameworks
- D . Reliance on qualitative analysis methods
A risk practitioner has discovered a deficiency in a critical system that cannot be patched.
Which of the following should be the risk practitioner’s FIRST course of action?
- A . Report the issue to internal audit.
- B . Submit a request to change management.
- C . Conduct a risk assessment.
- D . Review the business impact assessment.
Which of the following BEST enables an organization to determine whether risk management is aligned with its goals and objectives?
- A . The organization has approved policies that provide operational boundaries.
- B . Organizational controls are in place to effectively manage risk appetite.
- C . Environmental changes that impact risk are continually evaluated.
- D . The organization has an approved enterprise architecture (EA) program.
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
- A . Changes in the organization’s risk appetite and risk tolerance levels
- B . Impact due to changes in external and internal risk factors
- C . Changes in residual risk levels against acceptable levels
- D . Gaps in best practices and implemented controls across the industry
The BEST way to test the operational effectiveness of a data backup procedure is to:
- A . conduct an audit of files stored offsite.
- B . interview employees to compare actual with expected procedures.
- C . inspect a selection of audit trails and backup logs.
- D . demonstrate a successful recovery from backup files.