ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
Which of the following provides the MOST important information to facilitate a risk response decision?
- A . Audit findings
- B . Risk appetite
- C . Key risk indicators
- D . Industry best practices
Which of the following would BEST facilitate the implementation of data classification requirements?
- A . Assigning a data owner
- B . Scheduling periodic audits
- C . Implementing technical controls over the assets
- D . Implementing a data loss prevention (DLP) solution
Which of the following is MOST effective against external threats to an organizations confidential information?
- A . Single sign-on
- B . Data integrity checking
- C . Strong authentication
- D . Intrusion detection system
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
- A . avoided.
- B . accepted.
- C . mitigated.
- D . transferred.
Which of the following would be a risk practitioner’s BEST course of action when a project team has accepted a risk outside the established risk appetite?
- A . Reject the risk acceptance and require mitigating controls.
- B . Monitor the residual risk level of the accepted risk.
- C . Escalate the risk decision to the project sponsor for review.
- D . Document the risk decision in the project risk register.
A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago.
Which of the following is the GREATEST concern with this request?
- A . The risk assessment team may be overly confident of its ability to identify issues.
- B . The risk practitioner may be unfamiliar with recent application and process changes.
- C . The risk practitioner may still have access rights to the financial system.
- D . Participation in the risk assessment may constitute a conflict of interest.
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
- A . Logs and system events
- B . Intrusion detection system (IDS) rules
- C . Vulnerability assessment reports
- D . Penetration test reports
Which of the following is the MOST important consideration when prioritizing risk response?
- A . Requirements for regulatory obligations.
- B . Cost of control implementation.
- C . Effectiveness of risk treatment.
- D . Number of risk response options.
Which of the following is a risk practitioner’s BEST recommendation regarding disaster recovery management (DRM) for Software as a Service (SaaS) providers?
- A . Conduct inoremental backups of data in the SaaS environment to a local data center.
- B . Implement segregation of duties between multiple SaaS solution providers.
- C . Codify availability requirements in the SaaS provider’s contract.
- D . Conduct performance benchmarking against other SaaS service providers.
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization’s risk appetite?
- A . Developing contingency plans for key processes
- B . Implementing key performance indicators (KPIs)
- C . Adding risk triggers to entries in the risk register
- D . Establishing a series of key risk indicators (KRIs)