Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CRISC Practice Exam with Questions & Answers | Set: 5

Questions 201

Which of the following activities BEST facilitates effective risk management throughout the organization?

Options:
A.

Reviewing risk-related process documentation

B.

Conducting periodic risk assessments

C.

Performing a business impact analysis (BIA)

D.

Performing frequent audits

Isaca CRISC Premium Access
Questions 202

Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?

Options:
A.

It facilitates the use of a framework for risk management.

B.

It establishes a means for senior management to formally approve risk practices.

C.

It encourages risk-based decision making for stakeholders.

D.

It provides a basis for benchmarking against industry standards.

Questions 203

An organization's control environment is MOST effective when:

Options:
A.

controls perform as intended.

B.

controls operate efficiently.

C.

controls are implemented consistent

D.

control designs are reviewed periodically

Questions 204

Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?

Options:
A.

Number of days taken to remove access after staff separation dates

B.

Number of days taken for IT to remove access after receipt of HR instructions

C.

Number of termination requests processed per reporting period

D.

Number of days taken for HR to provide instructions to IT after staff separation dates

Questions 205

An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?

Options:
A.

Review the risk of implementing versus postponing with stakeholders.

B.

Run vulnerability testing tools to independently verify the vulnerabilities.

C.

Review software license to determine the vendor's responsibility regarding vulnerabilities.

D.

Require the vendor to correct significant vulnerabilities prior to installation.

Questions 206

To help identify high-risk situations, an organization should:

Options:
A.

continuously monitor the environment.

B.

develop key performance indicators (KPIs).

C.

maintain a risk matrix.

D.

maintain a risk register.

Questions 207

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

Options:
A.

Transborder data transfer restrictions

B.

Differences in regional standards

C.

Lack of monitoring over vendor activities

D.

Lack of after-hours incident management support

Questions 208

Which of the following conditions presents the GREATEST risk to an application?

Options:
A.

Application controls are manual.

B.

Application development is outsourced.

C.

Source code is escrowed.

D.

Developers have access to production environment.

Questions 209

Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?

Options:
A.

Failed login attempts

B.

Simulating a denial of service attack

C.

Absence of IT audit findings

D.

Penetration test

Questions 210

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

Options:
A.

stakeholder risk tolerance.

B.

benchmarking criteria.

C.

suppliers used by the organization.

D.

the control environment.

Questions 211

A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

Options:
A.

a root cause analysis is required

B.

controls are effective for ensuring continuity

C.

hardware needs to be upgraded

D.

no action is required as there was no impact

Questions 212

A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner's GREATEST concern?

Options:
A.

Security policies are being reviewed infrequently.

B.

Controls are not operating efficiently.

C.

Vulnerabilities are not being mitigated

D.

Aggregate risk is approaching the tolerance threshold

Questions 213

A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:

Options:
A.

Aligned with risk management capabilities.

B.

Based on industry trends.

C.

Related to probable events.

D.

Mapped to incident response plans.

Questions 214

The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:

Options:
A.

allocation of available resources

B.

clear understanding of risk levels

C.

assignment of risk to the appropriate owners

D.

risk to be expressed in quantifiable terms

Questions 215

Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?

Options:
A.

To enhance compliance with standards

B.

To minimize subjectivity of assessments

C.

To increase consensus among peers

D.

To provide assessments for benchmarking

Questions 216

A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?

Options:
A.

Document the finding in the risk register.

B.

Invoke the incident response plan.

C.

Re-evaluate key risk indicators.

D.

Modify the design of the control.

Questions 217

Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?

Options:
A.

Encrypt the data while in transit lo the supplier

B.

Contractually obligate the supplier to follow privacy laws.

C.

Require independent audits of the supplier's control environment

D.

Utilize blockchain during the data transfer

Questions 218

Which of the following is the PRIMARY reason to update a risk register with risk assessment results?

Options:
A.

To communicate the level and priority of assessed risk to management

B.

To provide a comprehensive inventory of risk across the organization

C.

To assign a risk owner to manage the risk

D.

To enable the creation of action plans to address nsk

Questions 219

Which of the following BEST enables effective IT control implementation?

Options:
A.

Key risk indicators (KRIs)

B.

Documented procedures

C.

Information security policies

D.

Information security standards

Questions 220

Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?

Options:
A.

Number of active nodes

B.

Blockchain size in gigabytes

C.

Average transaction speed

D.

Number of validated transactions

Questions 221

An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?

Options:
A.

IT infrastructure head

B.

Human resources head

C.

Supplier management head

D.

Application development head

Questions 222

A risk practitioner is collaborating with key stakeholders to prioritize a large number of IT risk scenarios. Which scenarios should receive the PRIMARY focus?

Options:
A.

Scenarios with the highest number of open audit issues

B.

Scenarios with the highest frequency of incidents

C.

Scenarios with the largest budget allocation for risk mitigation

D.

Scenarios with the highest risk impact to the business

Questions 223

Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?

Options:
A.

Risk appetite

B.

Control cost

C.

Control effectiveness

D.

Risk tolerance

Questions 224

Which of the following activities is PRIMARILY the responsibility of senior management?

Options:
A.

Bottom-up identification of emerging risks

B.

Categorization of risk scenarios against a standard taxonomy

C.

Prioritization of risk scenarios based on severity

D.

Review of external loss data

Questions 225

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

Options:
A.

reduces risk to an acceptable level

B.

quantifies risk impact

C.

aligns with business strategy

D.

advances business objectives.

Questions 226

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

Options:
A.

To provide a basis for determining the criticality of risk mitigation controls

B.

To provide early warning signs of a potential change in risk level

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide insight into the effectiveness of the intemnal control environment

Questions 227

Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?

Options:
A.

To support decision-making for risk response

B.

To hold risk owners accountable for risk action plans

C.

To secure resourcing for risk treatment efforts

D.

To enable senior management to compile a risk profile

Questions 228

It is MOST appropriate for changes to be promoted to production after they are:

Options:
A.

communicated to business management

B.

tested by business owners.

C.

approved by the business owner.

D.

initiated by business users.

Questions 229

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

Options:
A.

The percentage of servers with allowed patching exceptions

B.

The number of servers with local credentials to install patches

C.

The percentage of servers patched within required service level agreements

D.

The number of servers running the software patching service

Questions 230

Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?

Options:
A.

Testing the transmission of credit card numbers

B.

Reviewing logs for unauthorized data transfers

C.

Configuring the DLP control to block credit card numbers

D.

Testing the DLP rule change control process

Questions 231

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

Options:
A.

Organizational reporting process

B.

Incident reporting procedures

C.

Regularly scheduled audits

D.

Incident management policy

Questions 232

As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?

Options:
A.

An assessment of threats to the organization

B.

An assessment of recovery scenarios

C.

industry standard framework

D.

Documentation of testing procedures

Questions 233

The MOST essential content to include in an IT risk awareness program is how to:

Options:
A.

populate risk register entries and build a risk profile for management reporting.

B.

prioritize IT-related actions by considering risk appetite and risk tolerance.

C.

define the IT risk framework for the organization.

D.

comply with the organization's IT risk and information security policies.

Questions 234

An upward trend in which of the following metrics should be of MOST concern?

Options:
A.

Number of business change management requests

B.

Number of revisions to security policy

C.

Number of security policy exceptions approved

D.

Number of changes to firewall rules

Questions 235

Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?

Options:
A.

Automated access revocation

B.

Daily transaction reconciliation

C.

Rule-based data analytics

D.

Role-based user access model

Questions 236

A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?

Options:
A.

Report it to the chief risk officer.

B.

Advise the employee to forward the email to the phishing team.

C.

follow incident reporting procedures.

D.

Advise the employee to permanently delete the email.

Questions 237

Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?

Options:
A.

Risk register

B.

Risk scenario

C.

RACI matrix

D.

Risk response plan

Questions 238

A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?

Options:
A.

Add a digital certificate

B.

Apply multi-factor authentication

C.

Add a hash to the message

D.

Add a secret key

Questions 239

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

Options:
A.

detected incidents.

B.

residual risk.

C.

vulnerabilities.

D.

inherent risk.

Questions 240

After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

Options:
A.

A decrease in threats

B.

A change in the risk profile

C.

An increase in reported vulnerabilities

D.

An increase in identified risk scenarios

Questions 241

Which of the following will BEST help to ensure that information system controls are effective?

Options:
A.

Responding promptly to control exceptions

B.

Implementing compensating controls

C.

Testing controls periodically

D.

Automating manual controls

Questions 242

Which of the following BEST facilitates the identification of emerging risk?

Options:
A.

Performing scenario-based assessments

B.

Reviewing audit reports annually

C.

Conducting root cause analyses

D.

Engaging a risk-focused audit team

Questions 243

Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?

Options:
A.

Implement a tool to track the development team's deliverables.

B.

Review the software development life cycle.

C.

Involve the development team in planning.

D.

Assign more developers to the project team.

Questions 244

The MOST important reason to monitor key risk indicators (KRIs) is to help management:

Options:
A.

identity early risk transfer strategies.

B.

lessen the impact of realized risk.

C.

analyze the chain of risk events.

D.

identify the root cause of risk events.

Questions 245

Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?

Options:
A.

Data encryption has not been applied to all sensitive data across the organization.

B.

There are many data assets across the organization that need to be classified.

C.

Changes to information handling procedures are not documented.

D.

Changes to data sensitivity during the data life cycle have not been considered.

Questions 246

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

Options:
A.

The risk practitioner

B.

The risk owner

C.

The control owner

D.

The audit manager

Questions 247

An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?

Options:
A.

Database manager

B.

Public relations manager

C.

Data privacy manager

D.

Business manager

Questions 248

Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?

Options:
A.

To ensure emerging risk is identified and monitored

B.

To establish the maturity level of risk assessment processes

C.

To promote a risk-aware culture among staff

D.

To ensure risk trend data is collected and reported

Questions 249

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

Options:
A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Questions 250

Senior management has requested a risk practitioner's guidance on whether

a new technical control requested by a business unit is worth the investment.

Which of the following should be the MOST important consideration before

providing input?

Options:
A.

The cost of the control relative to the value of risk mitigation

B.

The effectiveness of the control at reducing residual risk levels

C.

The likelihood of a successful attack based on current risk

D.

assessments

E.

The availabilitv of budgeted funds for risk mitigationMitination

Exam Code: CRISC
Certification Provider: Isaca
Exam Name: Certified in Risk and Information Systems Control
Last Update: Jul 7, 2025
Questions: 1641

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.