ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 01.05.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 01.05.2026
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails.
Which of the following can BEST alleviate this issue while not sacrificing security?
- A . Implementing record retention tools and techniques
- B . Establishing e-discovery and data loss prevention (DLP)
- C . Sending notifications when near storage quota
- D . Implementing a bring your own device 1BVOD) policy
Which of the following is the BEST approach for determining whether a risk action plan is effective?
- A . Comparing the remediation cost against budget
- B . Assessing changes in residual risk
- C . Assessing the inherent risk
- D . Monitoring changes of key performance indicators (KPIs)
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
- A . plan awareness programs for business managers.
- B . evaluate maturity of the risk management process.
- C . assist in the development of a risk profile.
- D . maintain a risk register based on noncompliance.
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
- A . that results in a full root cause analysis.
- B . used for verification within the SLA.
- C . that are verified as actual incidents.
- D . resolved within the SLA.
Which of the following controls would BEST reduce the risk of account compromise?
- A . Enforce password changes.
- B . Enforce multi-factor authentication (MFA).
- C . Enforce role-based authentication.
- D . Enforce password encryption.
A financial institution has identified high risk of fraud in several business applications.
Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?
- A . Periodic user privileges review
- B . Log monitoring
- C . Periodic internal audits
- D . Segregation of duties
Which of the following controls BEST enables an organization to ensure a complete and accurate IT asset inventory?
- A . Prohibiting the use of personal devices for business
- B . Performing network scanning for unknown devices
- C . Requesting an asset list from business owners
- D . Documenting asset configuration baselines
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
- A . Chief financial officer
- B . Information security director
- C . Internal audit director
- D . Chief information officer
An organization has decided to implement a new Internet of Things (loT) solution.
Which of the following should be done FIRST when addressing security concerns associated with this new technology?
- A . Develop new loT risk scenarios.
- B . Implement loT device monitoring software.
- C . Introduce controls to the new threat environment.
- D . Engage external security reviews.
Which of the following should be considered when selecting a risk response?
- A . Risk scenarios analysis
- B . Risk response costs
- C . Risk factor awareness
- D . Risk factor identification