Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CRISC Practice Exam with Questions & Answers | Set: 2

Questions 51

Well-developed, data-driven risk measurements should be:

Options:
A.

reflective of the lowest organizational level.

B.

a data feed taken directly from operational production systems.

C.

reported to management the same day data is collected.

D.

focused on providing a forward-looking view.

Isaca CRISC Premium Access
Questions 52

Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?

Options:
A.

Cyber insurance

B.

Data backups

C.

Incident response plan

D.

Key risk indicators (KRIs)

Questions 53

Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?

Options:
A.

Review vendors' internal risk assessments covering key risk and controls.

B.

Obtain independent control reports from high-risk vendors.

C.

Review vendors performance metrics on quality and delivery of processes.

D.

Obtain vendor references from third parties.

Questions 54

Which of the following tools is MOST effective in identifying trends in the IT risk profile?

Options:
A.

Risk self-assessment

B.

Risk register

C.

Risk dashboard

D.

Risk map

Questions 55

Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?

Options:
A.

Prioritizing risk within each business unit

B.

Reviewing risk ranking methodology

C.

Promoting an organizational culture of risk awareness

D.

Assigning risk ownership to appropriate roles

Questions 56

An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?

Options:
A.

Variances in recovery times

B.

Ownership assignment for controls

C.

New potentially disruptive scenarios

D.

Contractual changes with customers

Questions 57

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

Options:
A.

Third-party data custodian

B.

Data custodian

C.

Regional office executive

D.

Data owner

Questions 58

What is the PRIMARY benefit of risk monitoring?

Options:
A.

It reduces the number of audit findings.

B.

It provides statistical evidence of control efficiency.

C.

It facilitates risk-aware decision making.

D.

It facilitates communication of threat levels.

Questions 59

A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?

Options:
A.

Regulatory restrictions for cross-border data transfer

B.

Service level objectives in the vendor contract

C.

Organizational culture differences between each country

D.

Management practices within each company

Questions 60

Which of the following provides the MOST useful information to determine risk exposure following control implementations?

Options:
A.

Strategic plan and risk management integration

B.

Risk escalation and process for communication

C.

Risk limits, thresholds, and indicators

D.

Policies, standards, and procedures

Questions 61

From a risk management perspective, the PRIMARY objective of using maturity models is to enable:

Options:
A.

solution delivery.

B.

resource utilization.

C.

strategic alignment.

D.

performance evaluation.

Questions 62

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

Options:
A.

The head of enterprise architecture (EA)

B.

The IT risk manager

C.

The information security manager

D.

The product owner

Questions 63

A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:

Options:
A.

update the risk register to reflect the correct level of residual risk.

B.

ensure risk monitoring for the project is initiated.

C.

conduct and document a business impact analysis (BIA).

D.

verify cost-benefit of the new controls being implemented.

Questions 64

In the three lines of defense model, a PRIMARY objective of the second line is to:

Options:
A.

Review and evaluate the risk management program.

B.

Ensure risk and controls are effectively managed.

C.

Implement risk management policies regarding roles and responsibilities.

D.

Act as the owner for any operational risk identified as part of the risk program.

Questions 65

An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?

Options:
A.

Acceptance

B.

Avoidance

C.

Transfer

D.

Reduction

Questions 66

Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?

Options:
A.

Identify any new business objectives with stakeholders.

B.

Present a business case for new controls to stakeholders.

C.

Revise the organization's risk and control policy.

D.

Review existing risk scenarios with stakeholders.

Questions 67

An organization is considering the adoption of an aggressive business strategy to achieve desired growth From a risk management perspective what should the risk practitioner do NEXT?

Options:
A.

Identify new threats resorting from the new business strategy

B.

Update risk awareness training to reflect current levels of risk appetite and tolerance

C.

Inform the board of potential risk scenarios associated with aggressive business strategies

D.

Increase the scale for measuring impact due to threat materialization

Questions 68

Which of the following BEST indicates that an organization's disaster

recovery plan (DRP) will mitigate the risk of the organization failing to recover

from a major service disruption?

Options:
A.

A defined recovery point objective (RPO)

B.

An experienced and certified disaster recovery team

C.

A comprehensive list of critical applications

D.

A record of quarterly disaster recovery tests

Questions 69

When classifying and prioritizing risk responses, the areas to address FIRST are those with:

Options:
A.

low cost effectiveness ratios and high risk levels

B.

high cost effectiveness ratios and low risk levels.

C.

high cost effectiveness ratios and high risk levels

D.

low cost effectiveness ratios and low risk levels.

Questions 70

Which of the following is the BEST course of action for a system administrator who suspects a colleague may be intentionally weakening a system's validation controls in order to pass through fraudulent transactions?

Options:
A.

Implement compensating controls to deter fraud attempts.

B.

Share the concern through a whistleblower communication channel.

C.

Monitor the activity to collect evidence.

D.

Determine whether the system environment has flaws that may motivate fraud attempts.

Questions 71

Which types of controls are BEST used to minimize the risk associated with a vulnerability?

Options:
A.

Detective

B.

Preventive

C.

Deterrent

D.

Directive

Questions 72

Which of the following describes the relationship between risk appetite and risk tolerance?

Options:
A.

Risk appetite is completely independent of risk tolerance.

B.

Risk tolerance is used to determine risk appetite.

C.

Risk appetite and risk tolerance are synonymous.

D.

Risk tolerance may exceed risk appetite.

Questions 73

Who is PRIMARILY accountable for risk treatment decisions?

Options:
A.

Risk owner

B.

Business manager

C.

Data owner

D.

Risk manager

Questions 74

Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?

Options:
A.

Exposure of log data

B.

Lack of governance

C.

Increased number of firewall rules

D.

Lack of agreed-upon standards

Questions 75

During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?

Options:
A.

Business process owners

B.

Business process consumers

C.

Application architecture team

D.

Internal audit

Questions 76

Which of the following would provide the MOST objective assessment of the effectiveness of an organization's security controls?

Options:
A.

An internal audit

B.

Security operations center review

C.

Internal penetration testing

D.

A third-party audit

Questions 77

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

Options:
A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Questions 78

Following the implementation of an Internet of Things (loT) solution, a risk practitioner identifies new risk factors with impact to existing controls. Which of the following is MOST important to include in a report to stakeholders?

Options:
A.

Identified vulnerabilities

B.

Business managers' concerns

C.

Changes to residual risk

D.

Risk strategies of peer organizations

Questions 79

What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?

Options:
A.

Review regular control testing results.

B.

Recommend a penetration test.

C.

Assess the risk to determine mitigation needed.

D.

Analyze key performance indicators (KPIs).

Questions 80

An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?

Options:
A.

Implement continuous control monitoring.

B.

Communicate the risk to management.

C.

Introduce recovery control procedures.

D.

Document a risk response plan.

Questions 81

External penetration tests MUST include:

Options:
A.

use of consultants to ensure completeness.

B.

communications to users of the target systems.

C.

changes to target data to prove the attack was successful.

D.

advance approval from system owners.

Questions 82

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:

Options:
A.

IT policy exceptions granted.

B.

Senior management approvals.

C.

Key technology controls covered by IT policies.

D.

Processes covered by IT policies.

Questions 83

When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?

Options:
A.

Users may share accounts with business system analyst

B.

Application may not capture a complete audit trail.

C.

Users may be able to circumvent application controls.

D.

Multiple connects to the database are used and slow the process

Questions 84

When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:

Options:
A.

risk appetite.

B.

security policies

C.

process maps.

D.

risk tolerance level

Questions 85

A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?

Options:
A.

Implement monitoring techniques.

B.

Implement layered security.

C.

Outsource to a local processor.

D.

Conduct an awareness campaign.

Questions 86

A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?

Options:
A.

Customer database manager

B.

Customer data custodian

C.

Data privacy officer

D.

Audit committee

Questions 87

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

Options:
A.

Limited blockchain adoption and support

B.

Reduced transaction speed and system responsiveness

C.

Reduced network integrity and availability

D.

Limited integration with external systems and blockchains

Questions 88

Which of the following will BEST help in communicating strategic risk priorities?

Options:
A.

Heat map

B.

Business impact analysis (BIA)

C.

Balanced Scorecard

D.

Risk register

Questions 89

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

Options:
A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Questions 90

An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?

Options:
A.

Due diligence for the recommended cloud vendor has not been performed.

B.

The business can introduce new Software as a Service (SaaS) solutions without IT approval.

C.

The maintenance of IT infrastructure has been outsourced to an Infrastructure as a Service (laaS) provider.

D.

Architecture responsibilities may not be clearly defined.

Questions 91

Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?

Options:
A.

To provide data for establishing the risk profile

B.

To provide assurance of adherence to risk management policies

C.

To provide measurements on the potential for risk to occur

D.

To provide assessments of mitigation effectiveness

Questions 92

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

Options:
A.

Relevance to the business process

B.

Regulatory compliance requirements

C.

Cost-benefit analysis

D.

Comparison against best practice

Questions 93

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

Options:
A.

Initiate disciplinary action against the risk owner.

B.

Reassess the risk and review the underlying controls.

C.

Review organizational ethics policies.

D.

Report the activity to the supervisor.

Questions 94

The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:

Options:
A.

the risk strategy is appropriate

B.

KRIs and KPIs are aligned

C.

performance of controls is adequate

D.

the risk monitoring process has been established

Questions 95

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

Options:
A.

The value at which control effectiveness would fail

B.

Thresholds benchmarked to peer organizations

C.

A typical operational value

D.

A value that represents the intended control state

Questions 96

Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?

Options:
A.

The program has not decreased threat counts.

B.

The program has not considered business impact.

C.

The program has been significantly revised

D.

The program uses non-customized training modules.

Questions 97

Which of the following is the BEST way for an organization to enable risk treatment decisions?

Options:
A.

Allocate sufficient funds for risk remediation.

B.

Promote risk and security awareness.

C.

Establish clear accountability for risk.

D.

Develop comprehensive policies and standards.

Questions 98

Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?

Options:
A.

Making data available to a larger audience of customers

B.

Data not being disposed according to the retention policy

C.

Personal data not being de-identified properly

D.

Data being used for purposes the data subjects have not opted into

Questions 99

Which of the following is MOST helpful in determining the effectiveness of an organization's IT risk mitigation efforts?

Options:
A.

Assigning identification dates for risk scenarios in the risk register

B.

Updating impact assessments for risk scenario

C.

Verifying whether risk action plans have been completed

D.

Reviewing key risk indicators (KRIS)

Questions 100

Which of the following is the MOST important characteristic of an effective risk management program?

Options:
A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Exam Code: CRISC
Certification Provider: Isaca
Exam Name: Certified in Risk and Information Systems Control
Last Update: Jun 24, 2025
Questions: 1641

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.