ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 29.05.2025 - Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 29.05.2025
The risk associated with an asset before controls are applied can be expressed as:
- A . a function of the likelihood and impact
- B . the magnitude of an impact
- C . a function of the cost and effectiveness of control.
- D . the likelihood of a given threat
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
- A . Previous audit reports
- B . Control objectives
- C . Risk responses in the risk register
- D . Changes in risk profiles
Which of the following BEST reduces the probability of laptop theft?
- A . Cable lock
- B . Acceptable use policy
- C . Data encryption
- D . Asset tag with GPS
An organization’s IT team has proposed the adoption of cloud computing as a cost-saving measure for the business.
Which of the following should be of GREATEST concern to the risk practitioner?
- A . Due diligence for the recommended cloud vendor has not been performed.
- B . The business can introduce new Software as a Service (SaaS) solutions without IT approval.
- C . The maintenance of IT infrastructure has been outsourced to an Infrastructure as a Service (laaS) provider.
- D . Architecture responsibilities may not be clearly defined.
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization’s technical environment?
- A . Business case documentation
- B . Organizational risk appetite statement
- C . Enterprise architecture (EA) documentation
- D . Organizational hierarchy
Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?
- A . Audit and compliance management
- B . The chief information officer (CIO) and the chief financial officer (CFO)
- C . Enterprise risk management and business process owners
- D . Executive management and the board of directors
An organization recently implemented new technologies that enable the use of robotic process automation.
Which of the following is MOST important to reassess?
- A . Risk profile
- B . Risk tolerance
- C . Risk capacity
- D . Risk appetite
Optimized risk management is achieved when risk is reduced:
- A . with strategic initiatives.
- B . to meet risk appetite.
- C . within resource availability.
- D . below risk appetite.
Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?
- A . Reviewing password change history
- B . Performing periodic access recertification
- C . Conducting social engineering exercises
- D . Reviewing the results of security awareness surveys
During an internal IT audit, an active network account belonging to a former employee was identified.
Which of the following is the BEST way to prevent future occurrences?
- A . Conduct a comprehensive review of access management processes.
- B . Declare a security incident and engage the incident response team.
- C . Conduct a comprehensive awareness session for system administrators.
- D . Evaluate system administrators‘ technical skills to identify if training is required.