ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 01.05.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 01.05.2026
Which of the following is the BEST method to identify unnecessary controls?
- A . Evaluating the impact of removing existing controls
- B . Evaluating existing controls against audit requirements
- C . Reviewing system functionalities associated with business processes
- D . Monitoring existing key risk indicators (KRIs)
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
- A . Percentage of vulnerabilities remediated within the agreed service level
- B . Number of vulnerabilities identified during the period
- C . Number of vulnerabilities re-opened during the period
- D . Percentage of vulnerabilities escalated to senior management
An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud.
Who owns the related data confidentiality risk?
- A . IT infrastructure head
- B . Human resources head
- C . Supplier management head
- D . Application development head
Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?
- A . Risk tolerance
- B . Risk appetite
- C . Risk awareness
- D . Risk policy
Which of the following stakeholders define risk tolerance for an enterprise?
- A . IT compliance and IT audit
- B . Regulators and shareholders
- C . The board and executive management
- D . Enterprise risk management (ERM)
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
- A . Insurance coverage
- B . Onsite replacement availability
- C . Maintenance procedures
- D . Installation manuals
Which of the following is the BEST method for identifying vulnerabilities?
- A . Batch job failure monitoring
- B . Periodic network scanning
- C . Annual penetration testing
- D . Risk assessments
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation.
Which ot the following is the risk practitioner’s BEST course of action?
- A . Collaborate with the risk owner to determine the risk response plan.
- B . Document the gap in the risk register and report to senior management.
- C . Include a right to audit clause in the service provider contract.
- D . Advise the risk owner to accept the risk.
Which of the following is MOST important when discussing risk within an organization?
- A . Adopting a common risk taxonomy
- B . Using key performance indicators (KPIs)
- C . Creating a risk communication policy
- D . Using key risk indicators (KRIs)
Which of the following should be the FIRST consideration when establishing a new risk governance program?
- A . Developing an ongoing awareness and training program
- B . Creating policies and standards that are easy to comprehend
- C . Embedding risk management into the organization
- D . Completing annual risk assessments on critical resources