Big 11.11 Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CRISC Exam Dumps - Isaca Certification Questions and Answers

Question # 54

A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Perform a business impact analysis (BIA).

B.

Perform a cost-benefit analysis.

C.

Review industry best practice.

D.

Review risk governance policies.

Buy Now
Question # 55

A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner

recommend be done NEXT?

Options:

A.

Implement targeted awareness training for new BYOD users.

B.

Implement monitoring to detect control deterioration.

C.

Identify log sources to monitor BYOD usage and risk impact.

D.

Reduce the risk tolerance level.

Buy Now
Question # 56

Which of the following provides the BEST assurance of the effectiveness of vendor security controls?

Options:

A.

Review vendor control self-assessments (CSA).

B.

Review vendor service level agreement (SLA) metrics.

C.

Require independent control assessments.

D.

Obtain vendor references from existing customers.

Buy Now
Question # 57

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

Options:

A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Buy Now
Question # 58

Which of the following situations would cause the GREATEST concern around the integrity of application logs?

Options:

A.

Weak privileged access management controls

B.

Lack of a security information and event management (SIEM) system

C.

Lack of data classification policies

D.

Use of hashing algorithms

Buy Now
Question # 59

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

Options:

A.

Classification of the data

B.

Type of device

C.

Remote management capabilities

D.

Volume of data

Buy Now
Question # 60

Which of the following is the BEST success criterion for control implementation?

Options:

A.

Adequate resources are allocated to perform the control.

B.

Responsibilities for control execution are properly defined.

C.

Risk is at an acceptable level after the control is in place.

D.

Key risk indicators (KRIs) for the control are properly defined.

Buy Now
Question # 61

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

Options:

A.

Evaluating risk impact

B.

Establishing key performance indicators (KPIs)

C.

Conducting internal audits

D.

Creating quarterly risk reports

Buy Now
Question # 62

Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?

Options:

A.

Corrective

B.

Preventive

C.

Detective

D.

Deterrent

Buy Now
Question # 63

An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?

Options:

A.

Most recent IT audit report results

B.

Replacement cost of IT assets

C.

Current annualized loss expectancy report

D.

Cyber insurance industry benchmarking report

Buy Now
Question # 64

Which of the following is the MOST important metric to monitor the performance of the change management process?

Options:

A.

Percentage of changes having separation of duties in code deployment

B.

Percentage of changes having completed post-implementation verification

C.

Percentage of changes having user acceptance testing (UAT) sign-off

D.

Percentage of changes having to invoke the rollback plan

Buy Now
Question # 65

The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?

Options:

A.

Assemble an incident response team.

B.

Create a disaster recovery plan (DRP).

C.

Develop a risk response plan.

D.

Initiate a business impact analysis (BIA).

Buy Now
Question # 66

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for

sensitive data?

Options:

A.

Assess the threat and associated impact.

B.

Evaluate risk appetite and tolerance levels

C.

Recommend device management controls

D.

Enable role-based access control.

Buy Now
Question # 67

Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?

Options:

A.

To ensure enterprise-wide risk management

B.

To establish control ownership

C.

To enable a comprehensive view of risk

D.

To identify key risk indicators (KRIs)

Buy Now
Question # 68

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

Options:

A.

To provide insight into the effectiveness of the internal control environment

B.

To provide a basis for determining the criticality of risk mitigation controls

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide early warning signs of a potential change in risk level

Buy Now
Question # 69

An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?

Options:

A.

Review the risk of implementing versus postponing with stakeholders.

B.

Run vulnerability testing tools to independently verify the vulnerabilities.

C.

Review software license to determine the vendor's responsibility regarding vulnerabilities.

D.

Require the vendor to correct significant vulnerabilities prior to installation.

Buy Now
Question # 70

The annualized loss expectancy (ALE) method of risk analysis:

Options:

A.

helps in calculating the expected cost of controls

B.

uses qualitative risk rankings such as low. medium and high.

C.

can be used m a cost-benefit analysts

D.

can be used to determine the indirect business impact.

Buy Now
Question # 71

Which of the following is a KEY outcome of risk ownership?

Options:

A.

Risk responsibilities are addressed.

B.

Risk-related information is communicated.

C.

Risk-oriented tasks are defined.

D.

Business process risk is analyzed.

Buy Now
Question # 72

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

Options:

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Buy Now
Question # 73

Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?

Options:

A.

Engaging external risk professionals to periodically review the risk

B.

Prioritizing global standards over local requirements in the risk profile

C.

Updating the risk profile with risk assessment results

D.

Assigning quantitative values to qualitative metrics in the risk register

Buy Now
Question # 74

An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?

Options:

A.

IT service desk manager

B.

Sales manager

C.

Customer service manager

D.

Access control manager

Buy Now
Question # 75

Who should be responsible (of evaluating the residual risk after a compensating control has been

Options:

A.

Compliance manager

B.

Risk owner

C.

Control owner

D.

Risk practitioner

Buy Now
Question # 76

Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?

Options:

A.

Ensuring that database changes are correctly applied

B.

Enforcing that changes are authorized

C.

Deterring illicit actions of database administrators

D.

Preventing system developers from accessing production data

Buy Now
Question # 77

An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:

Options:

A.

reduce the likelihood of future events

B.

restore availability

C.

reduce the impact of future events

D.

address the root cause

Buy Now
Question # 78

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

Options:

A.

Balanced scorecard

B.

Risk appetite

C.

Risk map

D.

Risk events

Buy Now
Question # 79

After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:

Options:

A.

recommend a program that minimizes the concerns of that production system.

B.

inform the development team of the concerns, and together formulate risk reduction measures.

C.

inform the process owner of the concerns and propose measures to reduce them

D.

inform the IT manager of the concerns and propose measures to reduce them.

Buy Now
Question # 80

Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?

Options:

A.

The number of stakeholders involved in IT risk identification workshops

B.

The percentage of corporate budget allocated to IT risk activities

C.

The percentage of incidents presented to the board

D.

The number of executives attending IT security awareness training

Buy Now
Question # 81

A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?

Options:

A.

Multiple corporate build images exist.

B.

The process documentation was not updated.

C.

The IT build process was not followed.

D.

Threats are not being detected.

Buy Now
Question # 82

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

Options:

A.

Limited blockchain adoption and support

B.

Reduced transaction speed and system responsiveness

C.

Reduced network integrity and availability

D.

Limited integration with external systems and blockchains

Buy Now
Question # 83

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

Options:

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Buy Now
Question # 84

Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?

Options:

A.

Customer notification plans

B.

Capacity management

C.

Access management

D.

Impacts on IT project delivery

Buy Now
Question # 85

Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?

Options:

A.

Internet of Things (IoT)

B.

Quantum computing

C.

Virtual reality (VR)

D.

Machine learning

Buy Now
Question # 86

What is a risk practitioner's BEST approach to monitor and measure how quickly an exposure to a specific risk can affect the organization?

Options:

A.

Create an asset valuation report.

B.

Create key performance indicators (KPls).

C.

Create key risk indicators (KRIs).

D.

Create a risk volatility report.

Buy Now
Question # 87

Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?

Options:

A.

Providing risk awareness training for business units

B.

Obtaining input from business management

C.

Understanding the business controls currently in place

D.

Conducting a business impact analysis (BIA)

Buy Now
Question # 88

Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?

Options:

A.

Time required for backup restoration testing

B.

Change in size of data backed up

C.

Successful completion of backup operations

D.

Percentage of failed restore tests

Buy Now
Question # 89

An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?

Options:

A.

Data classification schemes

B.

Industry data breach reports

C.

Data storage locations

D.

Data flow documentation

Buy Now
Question # 90

Which of the following would BEST facilitate the implementation of data classification requirements?

Options:

A.

Assigning a data owner

B.

Implementing technical control over the assets

C.

Implementing a data loss prevention (DLP) solution

D.

Scheduling periodic audits

Buy Now
Question # 91

Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?

Options:

A.

The impact of controls on the efficiency of the business in delivering services

B.

Linkage of identified risk scenarios with enterprise risk management

C.

Potential threats and vulnerabilities that may have an impact on the business

D.

Results of network vulnerability scanning and penetration testing

Buy Now
Question # 92

Which of the following would MOST likely cause a risk practitioner to reassess risk scenarios?

Options:

A.

A change in the risk management policy

B.

A major security incident

C.

A change in the regulatory environment

D.

An increase in intrusion attempts

Buy Now
Question # 93

Which of the following is MOST important for maintaining the effectiveness of an IT risk register?

Options:

A.

Removing entries from the register after the risk has been treated

B.

Recording and tracking the status of risk response plans within the register

C.

Communicating the register to key stakeholders

D.

Performing regular reviews and updates to the register

Buy Now
Question # 94

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

Options:

A.

Segregation of duties

B.

Three lines of defense

C.

Compliance review

D.

Quality assurance review

Buy Now
Question # 95

Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?

Options:

A.

Prepare a report for senior management.

B.

Assign responsibility and accountability for the incident.

C.

Update the risk register.

D.

Avoid recurrence of the incident.

Buy Now
Question # 96

Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?

Options:

A.

A third-party assessment report of control environment effectiveness must be provided at least annually.

B.

Incidents related to data toss must be reported to the organization immediately after they occur.

C.

Risk assessment results must be provided to the organization at least annually.

D.

A cyber insurance policy must be purchased to cover data loss events.

Buy Now
Question # 97

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

Options:

A.

Evaluate current risk management alignment with relevant regulations.

B.

Determine if business continuity procedures are reviewed and updated on a regular basis.

C.

Review the methodology used to conduct the business impact analysis (BIA).

D.

Conduct a benchmarking exercise against industry peers.

Buy Now
Question # 98

Winch of the following is the BEST evidence of an effective risk treatment plan?

Options:

A.

The inherent risk is below the asset residual risk.

B.

Remediation cost is below the asset business value

C.

The risk tolerance threshold s above the asset residual

D.

Remediation is completed within the asset recovery time objective (RTO)

Buy Now
Question # 99

What are the MOST essential attributes of an effective Key control indicator (KCI)?

Options:

A.

Flexibility and adaptability

B.

Measurability and consistency

C.

Robustness and resilience

D.

Optimal cost and benefit

Buy Now
Question # 100

When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?

Options:

A.

BCP testing is net in conjunction with the disaster recovery plan (DRP)

B.

Recovery time objectives (RTOs) do not meet business requirements.

C.

BCP is often tested using the walk-through method.

D.

Each business location has separate, inconsistent BCPs.

Buy Now
Question # 101

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

Options:

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Buy Now
Question # 102

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

Options:

A.

plan awareness programs for business managers.

B.

evaluate maturity of the risk management process.

C.

assist in the development of a risk profile.

D.

maintain a risk register based on noncompliance.

Buy Now
Question # 103

Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?

Options:

A.

The report was provided directly from the vendor.

B.

The risk associated with multiple control gaps was accepted.

C.

The control owners disagreed with the auditor's recommendations.

D.

The controls had recurring noncompliance.

Buy Now
Exam Code: CRISC
Exam Name: Certified in Risk and Information Systems Control
Last Update: Nov 8, 2025
Questions: 1810
CRISC pdf

CRISC PDF

$25.5  $84.99
CRISC Engine

CRISC Testing Engine

$28.5  $94.99
CRISC PDF + Engine

CRISC PDF + Testing Engine

$40.5  $134.99