ISACA CRISC Practice Exams
Last updated on Apr 01,2025- Exam Code: CRISC
- Exam Name: Certified in Risk and Information Systems Control
- Certification Provider: ISACA
- Latest update: Apr 01,2025
Which of the following is the MOST important document regarding the treatment of sensitive data?
- A . Encryption policy
- B . Organization risk profile
- C . Digital rights management policy
- D . Information classification policy
Which of the following is the MOST important element of a successful risk awareness training program?
- A . Customizing content for the audience
- B . Providing incentives to participants
- C . Mapping to a recognized standard
- D . Providing metrics for measurement
An organization has outsourced its IT security operations to a third party.
Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
- A . The third party s management
- B . The organization’s management
- C . The control operators at the third party
- D . The organization’s vendor management office
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
- A . Percentage of system uptime
- B . Percentage of relevant threats mitigated
- C . Total number of threats identified
- D . Reaction time of the system to threats
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented.
Which risk treatment has been selected?
- A . Avoidance
- B . Transfer
- C . Mitigation
- D . Acceptance
An organization has contracted with a cloud service provider to support the deployment of a new product.
Of the following, who should own the associated risk?
- A . The head of enterprise architecture (EA)
- B . The IT risk manager
- C . The information security manager
- D . The product owner
For a large software development project, risk assessments are MOST effective when performed:
- A . before system development begins.
- B . at system development.
- C . at each stage of the system development life cycle (SDLC).
- D . during the development of the business case.
An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites.
Which of the following will MOST effectively mitigate tins risk?
- A . Requiring the use of virtual private networks (VPNs)
- B . Establishing a data classification policy
- C . Conducting user awareness training
- D . Requiring employee agreement of the acceptable use policy
What is the PRIMARY benefit of risk monitoring?
- A . It reduces the number of audit findings.
- B . It provides statistical evidence of control efficiency.
- C . It facilitates risk-aware decision making.
- D . It facilitates communication of threat levels.
Which of the following BEST supports the management of identified risk scenarios?
- A . Collecting risk event data
- B . Maintaining a risk register
- C . Using key risk indicators (KRIs)
- D . Defining risk parameters