Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free Isaca CRISC Practice Exam with Questions & Answers | Set: 6

Questions 251

All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:

Options:
A.

select a provider to standardize the disaster recovery plans.

B.

outsource disaster recovery to an external provider.

C.

centralize the risk response function at the enterprise level.

D.

evaluate opportunities to combine disaster recovery plans.

Isaca CRISC Premium Access
Questions 252

A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?

Options:
A.

Review the most recent vulnerability scanning report.

B.

Determine the business criticality of the asset.

C.

Determine the adequacy of existing security controls.

D.

Review prior security incidents related to the asset.

Questions 253

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

Options:
A.

Risk and control ownership

B.

Senior management participation

C.

Business unit support

D.

Risk nomenclature and taxonomy

Questions 254

Which of the following is a risk practitioner's BEST course of action upon learning that a control under internal review may no longer be necessary?

Options:
A.

Obtain approval to retire the control.

B.

Update the status of the control as obsolete.

C.

Consult the internal auditor for a second opinion.

D.

Verify the effectiveness of the original mitigation plan.

Questions 255

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

Options:
A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Questions 256

An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?

Options:
A.

Move redundant IT infrastructure to a closer location.

B.

Obtain insurance and ensure sufficient funds are available for disaster recovery.

C.

Review the business continuity plan (BCP) and align it with the new business needs.

D.

Outsource disaster recovery services to a third-party IT service provider.

Questions 257

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

Options:
A.

Establishing a series of key risk indicators (KRIs).

B.

Adding risk triggers to entries in the risk register.

C.

Implementing key performance indicators (KPIs).

D.

Developing contingency plans for key processes.

Questions 258

To enable effective risk governance, it is MOST important for senior management to:

Options:
A.

Ensure the IT governance framework is up to date.

B.

Communicate the risk management strategy across the organization.

C.

Gain a clear understanding of business risk and related ownership.

D.

Ensure security policies and procedures are documented.

Questions 259

Which of the following is MOST important to determine as a result of a risk assessment?

Options:
A.

Process ownership

B.

Risk appetite statement

C.

Risk tolerance levels

D.

Risk response options

Questions 260

Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?

Options:
A.

An increase in the number of risk threshold exceptions

B.

An increase in the number of change events pending management review

C.

A decrease in the number of key performance indicators (KPIs)

D.

A decrease in the number of critical assets covered by risk thresholds

Questions 261

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

Options:
A.

Risk exposure expressed in business terms

B.

Recommendations for risk response options

C.

Resource requirements for risk responses

D.

List of business areas affected by the risk

Questions 262

Which of the following is MOST important to consider when determining risk appetite?

Options:
A.

Service level agreements (SLAs)

B.

Risk heat map

C.

IT capacity

D.

Risk culture

Questions 263

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

Options:
A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Questions 264

The MAIN reason for prioritizing IT risk responses is to enable an organization to:

Options:
A.

determine the risk appetite.

B.

determine the budget.

C.

define key performance indicators (KPIs).

D.

optimize resource utilization.

Questions 265

An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?

Options:
A.

Key control owner

B.

Operational risk manager

C.

Business process owner

D.

Chief information security officer (CISO)

Questions 266

The BEST way to improve a risk register is to ensure the register:

Options:
A.

is updated based upon significant events.

B.

documents possible countermeasures.

C.

contains the risk assessment completion date.

D.

is regularly audited.

Questions 267

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

Options:
A.

Validating employee social media accounts and passwords

B.

Monitoring Internet usage on employee workstations

C.

Disabling social media access from the organization's technology

D.

Implementing training and awareness programs

Questions 268

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?

Options:
A.

Postpone the risk assessment.

B.

Facilitate the exception process.

C.

Accept the manager's request.

D.

Reject the manager's request.

Questions 269

Winch of the following is the BEST evidence of an effective risk treatment plan?

Options:
A.

The inherent risk is below the asset residual risk.

B.

Remediation cost is below the asset business value

C.

The risk tolerance threshold s above the asset residual

D.

Remediation is completed within the asset recovery time objective (RTO)

Questions 270

Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?

Options:
A.

Percentage of legacy servers out of support

B.

Percentage of severs receiving automata patches

C.

Number of unpremeditated vulnerabilities

D.

Number of intrusion attempts

Questions 271

When testing the security of an IT system, il is MOST important to ensure that;

Options:
A.

tests are conducted after business hours.

B.

operators are unaware of the test.

C.

external experts execute the test.

D.

agreement is obtained from stakeholders.

Questions 272

Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?

Options:
A.

Chief financial officer

B.

Information security director

C.

Internal audit director

D.

Chief information officer

Questions 273

An organization wants to assess the maturity of its internal control environment. The FIRST step should be to:

Options:
A.

validate control process execution.

B.

determine if controls are effective.

C.

identify key process owners.

D.

conduct a baseline assessment.

Questions 274

A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?

Options:
A.

Enable data encryption in the test environment

B.

Implement equivalent security in the test environment.

C.

Prevent the use of production data for test purposes

D.

Mask data before being transferred to the test environment.

Questions 275

Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?

Options:
A.

Physical destruction

B.

Degaussing

C.

Data anonymization

D.

Data deletion

Questions 276

The percentage of unpatched systems is a:

Options:
A.

threat vector.

B.

critical success factor (CSF).

C.

key performance indicator (KPI).

D.

key risk indicator (KRI).

Questions 277

A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?

Options:
A.

Forensic analysis

B.

Risk assessment

C.

Root cause analysis

D.

Business impact analysis (BlA)

Questions 278

Which of the following roles should be assigned accountability for monitoring risk levels?

Options:
A.

Risk practitioner

B.

Business manager

C.

Risk owner

D.

Control owner

Questions 279

Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?

Options:
A.

Perform an audit.

B.

Conduct a risk analysis.

C.

Develop risk scenarios.

D.

Perform a cost-benefit analysis.

Questions 280

Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:

Options:
A.

minimize the number of risk scenarios for risk assessment.

B.

aggregate risk scenarios identified across different business units.

C.

build a threat profile of the organization for management review.

D.

provide a current reference to stakeholders for risk-based decisions.

Questions 281

The MOST effective approach to prioritize risk scenarios is by:

Options:
A.

assessing impact to the strategic plan.

B.

aligning with industry best practices.

C.

soliciting input from risk management experts.

D.

evaluating the cost of risk response.

Questions 282

Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?

Options:
A.

Reviewing the results of independent audits

B.

Performing a site visit to the cloud provider's data center

C.

Performing a due diligence review

D.

Conducting a risk workshop with key stakeholders

Questions 283

Which of the following is the PRIMARY accountability for a control owner?

Options:
A.

Communicate risk to senior management.

B.

Own the associated risk the control is mitigating.

C.

Ensure the control operates effectively.

D.

Identify and assess control weaknesses.

Questions 284

Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?

Options:
A.

Enhance the security awareness program.

B.

Increase the frequency of incident reporting.

C.

Purchase cyber insurance from a third party.

D.

Conduct a control assessment.

Questions 285

Which of the following would BEST facilitate the maintenance of data classification requirements?

Options:
A.

Scheduling periodic audits

B.

Assigning a data custodian

C.

Implementing technical controls over the assets

D.

Establishing a data loss prevention (DLP) solution

Questions 286

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?

Options:
A.

Percentage of IT assets with current malware definitions

B.

Number of false positives defected over a period of time

C.

Number of alerts generated by the anti-virus software

D.

Frequency of anti-vinjs software updates

Questions 287

Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?

Options:
A.

Corporate incident escalation protocols are established.

B.

Exposure is integrated into the organization's risk profile.

C.

Risk appetite cascades to business unit management

D.

The organization-wide control budget is expanded.

Questions 288

Which of the following is MOST important to consider when determining a recovery time objective (RTO)?

Options:
A.

Time between backups for critical data

B.

Sensitivity of business data involved

C.

Cost of downtime due to a disaster

D.

Maximum tolerable data loss after an incident

Questions 289

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

Options:
A.

Average time to implement patches after vendor release

B.

Number of patches tested prior to deployment

C.

Increase in the frequency of patches deployed into production

D.

Percent of patches implemented within established timeframe

Questions 290

Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?

Options:
A.

Perform a post-implementation review.

B.

Conduct user acceptance testing.

C.

Review the key performance indicators (KPIs).

D.

Interview process owners.

Questions 291

Which of the following is the MAIN reason for analyzing risk scenarios?

Options:
A.

Identifying additional risk scenarios

B.

Updating the heat map

C.

Assessing loss expectancy

D.

Establishing a risk appetite

Questions 292

Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?

Options:
A.

Risk management

B.

Business units

C.

External audit

D.

Internal audit

Questions 293

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

Options:
A.

Percentage of business users completing risk training

B.

Percentage of high-risk scenarios for which risk action plans have been developed

C.

Number of key risk indicators (KRIs) defined

D.

Time between when IT risk scenarios are identified and the enterprise's response

Questions 294

Which of the following is MOST important for a risk practitioner to verify when periodically reviewing risk response action plans?

Options:
A.

The action plans have documented schedules

B.

The action plans treat the corresponding risk

C.

Budget has been allocated for the action plans

D.

Key risk indicators (KRIs) are defined in the action plans

Questions 295

Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?

Options:
A.

Incident reports

B.

Cost-benefit analysis

C.

Risk tolerance

D.

Control objectives

Questions 296

Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?

Options:
A.

Risk taxonomy

B.

Risk response

C.

Risk appetite

D.

Risk ranking

Questions 297

Determining if organizational risk is tolerable requires:

Options:
A.

mapping residual risk with cost of controls

B.

comparing against regulatory requirements

C.

comparing industry risk appetite with the organizations.

D.

understanding the organization's risk appetite.

Questions 298

Which of the following would be the GREATEST concern related to data privacy when implementing an Internet of Things (loT) solution that collects personally identifiable information (Pll)?

Options:
A.

A privacy impact assessment has not been completed.

B.

Data encryption methods apply to a subset of Pll obtained.

C.

The data privacy officer was not consulted.

D.

Insufficient access controls are used on the loT devices.

Questions 299

An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?

Options:
A.

Data minimization

B.

Accountability

C.

Accuracy

D.

Purpose limitation

Questions 300

An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?

Options:
A.

Communicate sanctions for policy violations to all staff.

B.

Obtain signed acceptance of the new policy from employees.

C.

Train all staff on relevant information security best practices.

D.

Implement data loss prevention (DLP) within the corporate network.

Exam Code: CRISC
Certification Provider: Isaca
Exam Name: Certified in Risk and Information Systems Control
Last Update: Jul 13, 2025
Questions: 1641

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.