ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 01.05.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 01.05.2026
Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?
- A . Maintain and review the classified data inventor.
- B . Implement mandatory encryption on data
- C . Conduct an awareness program for data owners and users.
- D . Define and implement a data classification policy
Following an acquisition, the acquiring company’s risk practitioner has been asked to update the organization’s IT risk profile.
What is the MOST important information to review from the acquired company to facilitate this task?
- A . Internal and external audit reports
- B . Risk disclosures in financial statements
- C . Risk assessment and risk register
- D . Business objectives and strategies
Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?
- A . Review vendors‘ internal risk assessments covering key risk and controls.
- B . Obtain independent control reports from high-risk vendors.
- C . Review vendors performance metrics on quality and delivery of processes.
- D . Obtain vendor references from third parties.
Which of the following is the MOST effective control to maintain the integrity of system configuration files?
- A . Recording changes to configuration files
- B . Implementing automated vulnerability scanning
- C . Restricting access to configuration documentation
- D . Monitoring against the configuration standard
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
- A . identify specific project risk.
- B . obtain a holistic view of IT strategy risk.
- C . understand risk associated with complex processes.
- D . incorporate subject matter expertise.
Which of the blowing is MOST important when implementing an organization s security policy?
- A . Obtaining management support
- B . Benchmarking against industry standards
- C . Assessing compliance requirements
- D . Identifying threats and vulnerabilities
The MAIN purpose of selecting a risk response is to.
- A . ensure compliance with local regulatory requirements
- B . demonstrate the effectiveness of risk management practices.
- C . ensure organizational awareness of the risk level
- D . mitigate the residual risk to be within tolerance
Which of the following is the GREATEST concern associated with redundant data in an organization’s inventory system?
- A . Poor access control
- B . Unnecessary data storage usage
- C . Data inconsistency
- D . Unnecessary costs of program changes
Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?
- A . Monitoring digital platforms that disseminate inaccurate or misleading news stories
- B . Engaging public relations personnel to debunk false stories and publications
- C . Restricting the use of social media on corporate networks during specific hours
- D . Providing awareness training to understand and manage these types of attacks
A risk action plan has been changed during the risk mitigation effort.
Which of the following is MOST important for the risk practitioner to verify?
- A . Impact of the change on inherent risk.
- B . Approval for the change by the risk owner.
- C . Business rationale for the change.
- D . Risk to the mitigation effort due to the change.