ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 30.04.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 30.04.2026
An organization recently implemented a cybersecurity awareness program that includes phishing simulation exercises for all employees.
What type of control is being utilized?
- A . Preventive
- B . Compensating
- C . Deterrent
- D . Detective
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
- A . Perform a gap analysis.
- B . Prioritize impact to the business units.
- C . Perform a risk assessment.
- D . Review the risk tolerance and appetite.
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
- A . Community cloud
- B . Private cloud
- C . Hybrid cloud
- D . Public cloud
Which of the following is the MOST important outcome of reviewing the risk management process?
- A . Assuring the risk profile supports the IT objectives
- B . Improving the competencies of employees who performed the review
- C . Determining what changes should be made to IS policies to reduce risk
- D . Determining that procedures used in risk assessment are appropriate
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response‘
- A . Identify the regulatory bodies that may highlight this gap
- B . Highlight news articles about data breaches
- C . Evaluate the risk as a measure of probable loss
- D . Verify if competitors comply with a similar policy
Which of the following is MOST useful input when developing risk scenarios?
- A . Common attacks in other industries.
- B . Identification of risk events.
- C . Impact on critical assets.
- D . Probability of disruptive risk events.
An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%.
This is an example of:
- A . risk mitigation.
- B . risk evaluation.
- C . risk appetite.
- D . risk tolerance.
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
- A . The risk tolerance level
- B . Occurrences of specific events
- C . Risk scenarios
- D . A performance measurement
Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?
- A . Complex security administration
- B . Single point of failure
- C . Inability to access key information
- D . User resistance to single sign-on
The PRIMARY objective for requiring an independent review of an organization’s IT risk management process should be to:
- A . assess gaps in IT risk management operations and strategic focus.
- B . confirm that IT risk assessment results are expressed as business impact.
- C . verify implemented controls to reduce the likelihood of threat materialization.
- D . ensure IT risk management is focused on mitigating potential risk.