ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 01.05.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 01.05.2026
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents.
Which of the following is the BEST course of action?
- A . Evaluate the relevance of the evolving threats.
- B . Review past internal audit results.
- C . Respond to organizational security threats.
- D . Research industry published studies.
Which of the following should be the PRIMARY consideration for assigning risk mitigation responsibility?
- A . Ability to allocate resources to address risk
- B . Ability to communicate directly to senior management
- C . Detailed knowledge of business operations
- D . Expertise in risk management
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
- A . Threshold definition
- B . Escalation procedures
- C . Automated data feed
- D . Controls monitoring
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
- A . obtain the support of executive management.
- B . map the business processes to supporting IT and other corporate resources.
- C . identify critical business processes and the degree of reliance on support services.
- D . document the disaster recovery process.
Which of the following is a risk practitioner’s BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?
- A . Implement a tool to track the development team’s deliverables.
- B . Review the software development life cycle.
- C . Involve the development team in planning.
- D . Assign more developers to the project team.
A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance.
Which of the following should the risk practitioner recommend be done NEXT?
- A . Implement targeted awareness training for new BYOD users.
- B . Implement monitoring to detect control deterioration.
- C . Identify log sources to monitor BYOD usage and risk impact.
- D . Reduce the risk tolerance level.
Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?
- A . Making data available to a larger audience of customers
- B . Data not being disposed according to the retention policy
- C . Personal data not being de-identified properly
- D . Data being used for purposes the data subjects have not opted into
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
- A . Introducing control procedures early in the life cycle
- B . Implementing loT device software monitoring
- C . Performing periodic risk assessments of loT
- D . Performing secure code reviews
The PRIMARY reason for communicating risk assessment results to data owners is to enable the:
- A . design of appropriate controls.
- B . industry benchmarking of controls.
- C . prioritization of response efforts.
- D . classification of information assets.
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
- A . Al may result in less reliance on human intervention.
- B . Malicious activity may inadvertently be classified as normal during baselining.
- C . Risk assessments of heuristic security systems are more difficult.
- D . Predefined patterns of malicious activity may quickly become outdated.