Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free Isaca CRISC Practice Exam with Questions & Answers | Set: 9

Questions 401

Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?

Options:
A.

The skill level required of a threat actor

B.

The amount of personally identifiable information (PH) disclosed

C.

The ability to detect and trace the threat action

D.

The amount of data that might be exposed by a threat action

Isaca CRISC Premium Access
Questions 402

When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?

Options:
A.

Mapping threats to organizational objectives

B.

Reviewing past audits

C.

Analyzing key risk indicators (KRIs)

D.

Identifying potential sources of risk

Questions 403

Which of the following is MOST helpful when determining whether a system security control is effective?

Options:
A.

Control standard operating procedures

B.

Latest security assessment

C.

Current security threat report

D.

Updated risk register

Questions 404

A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

Options:
A.

Enable data encryption in the test environment.

B.

Prevent the use of production data in the test environment

C.

De-identify data before being transferred to the test environment.

D.

Enforce multi-factor authentication within the test environment.

Questions 405

Which of the following is the MAIN purpose of monitoring risk?

Options:
A.

Communication

B.

Risk analysis

C.

Decision support

D.

Benchmarking

Questions 406

Which of the following would BEST prevent an unscheduled application of a patch?

Options:
A.

Network-based access controls

B.

Compensating controls

C.

Segregation of duties

D.

Change management

Questions 407

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

Options:
A.

chief risk officer.

B.

project manager.

C.

chief information officer.

D.

business process owner.

Questions 408

Which of the following would require updates to an organization's IT risk register?

Options:
A.

Discovery of an ineffectively designed key IT control

B.

Management review of key risk indicators (KRls)

C.

Changes to the team responsible for maintaining the register

D.

Completion of the latest internal audit

Questions 409

Which of the following is the BEST way to support communication of emerging risk?

Options:
A.

Update residual risk levels to reflect the expected risk impact.

B.

Adjust inherent risk levels upward.

C.

Include it on the next enterprise risk committee agenda.

D.

Include it in the risk register for ongoing monitoring.

Questions 410

Which of the following would be MOST useful to senior management when determining an appropriate risk response?

Options:
A.

A comparison of current risk levels with established tolerance

B.

A comparison of cost variance with defined response strategies

C.

A comparison of current risk levels with estimated inherent risk levels

D.

A comparison of accepted risk scenarios associated with regulatory compliance

Questions 411

Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

Options:
A.

possible risk and suggested mitigation plans.

B.

design of controls to encrypt the data to be shared.

C.

project plan for classification of the data.

D.

summary of data protection and privacy legislation.

Questions 412

A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?

Options:
A.

Include an indemnification clause in the provider's contract.

B.

Monitor provider performance against service level agreements (SLAs).

C.

Purchase cyber insurance to protect against data breaches.

D.

Ensure appropriate security controls are in place through independent audits.

Questions 413

While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:

Options:
A.

control is ineffective and should be strengthened

B.

risk is inefficiently controlled.

C.

risk is efficiently controlled.

D.

control is weak and should be removed.

Questions 414

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

Options:
A.

Weak governance structures

B.

Senior management scrutiny

C.

Complex regulatory environment

D.

Unclear reporting relationships

Questions 415

Which of the following is MOST important to understand when determining an appropriate risk assessment approach?

Options:
A.

Complexity of the IT infrastructure

B.

Value of information assets

C.

Management culture

D.

Threats and vulnerabilities

Questions 416

The BEST criteria when selecting a risk response is the:

Options:
A.

capability to implement the response

B.

importance of IT risk within the enterprise

C.

effectiveness of risk response options

D.

alignment of response to industry standards

Questions 417

Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization's:

Options:
A.

risk classification methods

B.

risk-based capital allocation

C.

risk portfolio

D.

risk culture

Questions 418

Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?

Options:
A.

A comparison of the costs of notice and consent control options

B.

Examples of regulatory fines incurred by industry peers for noncompliance

C.

A report of critical controls showing the importance of notice and consent

D.

A cost-benefit analysis of the control versus probable legal action

Questions 419

An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?

Options:
A.

Employees

B.

Data

C.

Reputation

D.

Customer lists

Questions 420

An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?

Options:
A.

Organizational strategy

B.

Employee code of conduct

C.

Industry best practices

D.

Organizational policy

Questions 421

When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:

Options:
A.

is correlated to risk and tracks variances in the risk.

B.

is assigned to IT processes and projects with a low level of risk.

C.

has a high correlation with the process outcome.

D.

triggers response based on risk thresholds.

Questions 422

Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?

Options:
A.

Completeness of system documentation

B.

Results of end user acceptance testing

C.

Variances between planned and actual cost

D.

availability of in-house resources

Questions 423

What is the BEST information to present to business control owners when justifying costs related to controls?

Options:
A.

Loss event frequency and magnitude

B.

The previous year's budget and actuals

C.

Industry benchmarks and standards

D.

Return on IT security-related investments

Questions 424

The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:

Options:
A.

identify specific project risk.

B.

obtain a holistic view of IT strategy risk.

C.

understand risk associated with complex processes.

D.

incorporate subject matter expertise.

Questions 425

Which of the following is the MOST significant risk related to an organization's use of AI technology?

Options:
A.

The AI system's contract does not include a right-to-audit clause

B.

The AI system is being used beyond its intended purpose

C.

The AI system is on unsupported infrastructure

D.

The AI system results have not been validated

Questions 426

An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?

Options:
A.

Risk profile

B.

Risk tolerance

C.

Risk capacity

D.

Risk appetite

Questions 427

Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?

Options:
A.

The KRIs' source data lacks integrity.

B.

The KRIs are not automated.

C.

The KRIs are not quantitative.

D.

The KRIs do not allow for trend analysis.

Questions 428

Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?

Options:
A.

Testing is completed in phases, with user testing scheduled as the final phase.

B.

Segregation of duties controls are overridden during user testing phases.

C.

Data anonymization is used during all cycles of end-user testing.

D.

Testing is completed by IT support users without input from end users.

Questions 429

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

Options:
A.

To identify threats introduced by business processes

B.

To identify risk when personal information is collected

C.

To ensure senior management has approved the use of personal information

D.

To ensure compliance with data privacy laws and regulations

Questions 430

Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?

Options:
A.

Require multi-factor authentication (MFA) to access the digital wallet.

B.

Use a digital key to encrypt the contents of the wallet.

C.

Enable audit logging on the digital wallet's device.

D.

Require public key infrastructure (PKI) to authorize transactions.

Questions 431

Which of the following BEST assists in justifying an investment in automated controls?

Options:
A.

Cost-benefit analysis

B.

Alignment of investment with risk appetite

C.

Elimination of compensating controls

D.

Reduction in personnel costs

Questions 432

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

Options:
A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Questions 433

Which of the following is MOST helpful to understand the consequences of an IT risk event?

Options:
A.

Fault tree analysis

B.

Historical trend analysis

C.

Root cause analysis

D.

Business impact analysis (BIA)

Questions 434

Which of the following is the MOST important consideration when selecting digital signature software?

Options:
A.

Availability

B.

Nonrepudiation

C.

Accuracy

D.

Completeness

Questions 435

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

Options:
A.

Performing a benchmark analysis and evaluating gaps

B.

Conducting risk assessments and implementing controls

C.

Communicating components of risk and their acceptable levels

D.

Participating in peer reviews and implementing best practices

Questions 436

Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?

Options:
A.

Well documented policies and procedures

B.

Risk and issue tracking

C.

An IT strategy committee

D.

Change and release management

Questions 437

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

Options:
A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

Questions 438

After identifying new risk events during a project, the project manager s NEXT step should be to:

Options:
A.

determine if the scenarios need 10 be accepted or responded to.

B.

record the scenarios into the risk register.

C.

continue with a qualitative risk analysis.

D.

continue with a quantitative risk analysis.

Questions 439

A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner’s BEST course of action to determine root cause?

Options:
A.

Review the risk profile

B.

Review pokey change history

C.

interview the control owner

D.

Perform control testing

Questions 440

Which of the following cloud service models is MOST appropriate for client organizations that want to maximize their control over management of the data life cycle?

Options:
A.

Data as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Questions 441

An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?

Options:
A.

Detective

B.

Deterrent

C.

Preventive

D.

Corrective

Questions 442

An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:

Options:
A.

risk mitigation.

B.

risk evaluation.

C.

risk appetite.

D.

risk tolerance.

Questions 443

An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?

Options:
A.

Disaster recovery plan (DRP) of the system

B.

Right to audit the provider

C.

Internal controls to ensure data privacy

D.

Transparency of key performance indicators (KPIs)

Questions 444

Which of the following BEST supports ethical IT risk management practices?

Options:
A.

Robust organizational communication channels

B.

Mapping of key risk indicators (KRIs) to corporate strategy

C.

Capability maturity models integrated with risk management frameworks

D.

Rigorously enforced operational service level agreements (SLAs)

Questions 445

Which of the following poses the GREATEST risk to an organization's operations during a major it transformation?

Options:
A.

Lack of robust awareness programs

B.

infrequent risk assessments of key controls

C.

Rapid changes in IT procedures

D.

Unavailability of critical IT systems

Questions 446

Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?

Options:
A.

Single loss expectancy (SLE)

B.

Cost of the information system

C.

Availability of additional compensating controls

D.

Potential business impacts are within acceptable levels

Questions 447

Which of the following provides the MOST useful information to senior management about risk mitigation status?

Options:
A.

Risk strategy

B.

Risk register

C.

Gap analysis

D.

Business impact analysis (BIA)

Questions 448

The PRIMARY advantage of involving end users in continuity planning is that they:

Options:
A.

have a better understanding of specific business needs

B.

can balance the overall technical and business concerns

C.

can see the overall impact to the business

D.

are more objective than information security management.

Questions 449

Which of the following would be of GREATEST concern regarding an organization's asset management?

Options:
A.

Lack of a mature records management program

B.

Lack of a dedicated asset management team

C.

Decentralized asset lists

D.

Incomplete asset inventory

Questions 450

Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?

Options:
A.

A risk roadmap

B.

A balanced scorecard

C.

A heat map

D.

The risk register

Exam Code: CRISC
Certification Provider: Isaca
Exam Name: Certified in Risk and Information Systems Control
Last Update: Jun 24, 2025
Questions: 1641

Isaca Free Exams

Isaca Free Exams
Examstrack offers comprehensive free resources and practice tests for Isaca exams.