ISACA CRISC Practice Exams
Last updated on Apr 07,2025- Exam Code: CRISC
- Exam Name: Certified in Risk and Information Systems Control
- Certification Provider: ISACA
- Latest update: Apr 07,2025
A business unit is updating a risk register with assessment results for a key project.
Which of the following is MOST important to capture in the register?
- A . The team that performed the risk assessment
- B . An assigned risk manager to provide oversight
- C . Action plans to address risk scenarios requiring treatment
- D . The methodology used to perform the risk assessment
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
- A . The recovery time objective (RTO)
- B . The likelihood of a recurring attack
- C . The organization’s risk tolerance
- D . The business significance of the information
An audit reveals that there are changes in the environment that are not reflected in the risk profile.
Which of the following is the BEST course of action?
- A . Review the risk identification process.
- B . Inform the risk scenario owners.
- C . Create a risk awareness communication plan.
- D . Update the risk register.
Which of the following would be a risk practitioner’s BEST course of action when a project team has accepted a risk outside the established risk appetite?
- A . Reject the risk acceptance and require mitigating controls.
- B . Monitor the residual risk level of the accepted risk.
- C . Escalate the risk decision to the project sponsor for review.
- D . Document the risk decision in the project risk register.
Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?
- A . Business case
- B . Balanced scorecard
- C . Industry standards
- D . Heat map
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
- A . Some critical business applications are not included in the plan
- B . Several recovery activities will be outsourced
- C . The plan is not based on an internationally recognized framework
- D . The chief information security officer (CISO) has not approved the plan
Which of the following is the MOST important consideration when prioritizing risk response?
- A . Requirements for regulatory obligations.
- B . Cost of control implementation.
- C . Effectiveness of risk treatment.
- D . Number of risk response options.
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
- A . Review the vendor selection process and vetting criteria.
- B . Assess whether use of service falls within risk tolerance thresholds.
- C . Establish service level agreements (SLAs) with the vendor.
- D . Check the contract for appropriate security risk and control provisions.
An organization control environment is MOST effective when:
- A . control designs are reviewed periodically
- B . controls perform as intended.
- C . controls are implemented consistently.
- D . controls operate efficiently
Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?
- A . Organizational strategy
- B . Cost-benefit analysis
- C . Control self-assessment (CSA)
- D . Business requirements