ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
An organization has decided to implement an emerging technology and incorporate the new capabilities into its strategic business plan. Business operations for the technology will be outsourced.
What will be the risk practitioner’s PRIMARY role during the change?
- A . Managing third-party risk
- B . Developing risk scenarios
- C . Managing the threat landscape
- D . Updating risk appetite
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager.
Which of the following is the NEXT step?
- A . Develop a risk action plan to address the findings.
- B . Evaluate the impact of the vulnerabilities to the business application.
- C . Escalate the findings to senior management and internal audit.
- D . Conduct a penetration test to validate the vulnerabilities from the findings.
Which of the following is the BEST indication that an organization’s risk management program has not reached the desired maturity level?
- A . Significant increases in risk mitigation budgets
- B . Large fluctuations in risk ratings between assessments
- C . A steady increase in the time to recover from incidents
- D . A large number of control exceptions
Which of the following describes the relationship between risk appetite and risk tolerance?
- A . Risk appetite is completely independent of risk tolerance.
- B . Risk tolerance is used to determine risk appetite.
- C . Risk appetite and risk tolerance are synonymous.
- D . Risk tolerance may exceed risk appetite.
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
- A . To provide a basis for determining the criticality of risk mitigation controls
- B . To provide early warning signs of a potential change in risk level
- C . To provide benchmarks for assessing control design effectiveness against industry peers
- D . To provide insight into the effectiveness of the intemnal control environment
Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?
- A . Inherent risk and likelihood
- B . Management action plans associated with audit findings
- C . Residual risk relative to appetite and tolerance
- D . Key risk indicator (KRI) trends
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
- A . Changes in control design
- B . A decrease in the number of key controls
- C . Changes in control ownership
- D . An increase in residual risk
For a large software development project, risk assessments are MOST effective when performed:
- A . before system development begins.
- B . at system development.
- C . at each stage of the system development life cycle (SDLC).
- D . during the development of the business case.
The PRIMARY purpose of using control metrics is to evaluate the:
- A . amount of risk reduced by compensating controls.
- B . amount of risk present in the organization.
- C . variance against objectives.
- D . number of incidents.
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of
the organization’s risk register?
- A . Risk taxonomy
- B . Risk response
- C . Risk appetite
- D . Risk ranking