ISACA CRISC Übungsprüfungen
Zuletzt aktualisiert am 01.05.2026- Prüfungscode: CRISC
- Prüfungsname: Certified in Risk and Information Systems Control
- Zertifizierungsanbieter: ISACA
- Zuletzt aktualisiert am: 01.05.2026
Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?
- A . Communicating risk awareness materials regularly
- B . Establishing key risk indicators (KRIs) to monitor risk management processes
- C . Ensuring that business activities minimize inherent risk
- D . Embedding risk management in business activities
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
- A . reduces risk to an acceptable level
- B . quantifies risk impact
- C . aligns with business strategy
- D . advances business objectives.
The PRIMARY reason for a risk practitioner to review business processes is to:
- A . Benchmark against peer organizations.
- B . Identify appropriate controls within business processes.
- C . Assess compliance with global standards.
- D . Identify risk owners related to business processes.
Which of the following should be considered FIRST when creating a comprehensive IT risk register?
- A . Risk management budget
- B . Risk mitigation policies
- C . Risk appetite
- D . Risk analysis techniques
Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited.
Which of the following would be the BEST response to this scenario?
- A . Assess the vulnerability management process.
- B . Conduct a control serf-assessment.
- C . Conduct a vulnerability assessment.
- D . Reassess the inherent risk of the target.
When creating a program to manage data privacy risk, which of the following is MOST important to ensure that the program is successful?
- A . Adoption of mission and vision statements
- B . Alignment with applicable legal and regulatory requirements
- C . Compliance with industry frameworks
- D . Approval of mitigating and compensating controls
Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?
- A . Key risk indicators (KRls) are developed for key IT risk scenarios
- B . IT risk scenarios are assessed by the enterprise risk management team
- C . Risk appetites for IT risk scenarios are approved by key business stakeholders.
- D . IT risk scenarios are developed in the context of organizational objectives.
Which of the following BEST contributes to the implementation of an effective risk response action plan?
- A . An IT tactical plan
- B . Disaster recovery and continuity testing
- C . Assigned roles and responsibilities
- D . A business impact analysis
An organization is developing a risk universe to create a holistic view of its overall risk profile.
Which of the following is the GREATEST barrier to achieving the initiative’s objectives?
- A . Lack of cross-functional risk assessment workshops within the organization
- B . Lack of common understanding of the organization’s risk culture
- C . Lack of quantitative methods to aggregate the total risk exposure
- D . Lack of an integrated risk management system to aggregate risk scenarios
While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario.
Which of the following is the BEST course of action?
- A . Update the risk register with the average of residual risk for both business units.
- B . Review the assumptions of both risk scenarios to determine whether the variance is reasonable.
- C . Update the risk register to ensure both risk scenarios have the highest residual risk.
- D . Request that both business units conduct another review of the risk.