Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CRISC Exam Dumps - Isaca Certification Questions and Answers

Question # 104

Options:

A.

Internal email communications are not encrypted.

B.

Data transmission within the corporate network is not encrypted.

C.

Internally created documents are not automatically classified.

D.

Data transmission across public networks is not encrypted.

Buy Now
Question # 105

Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:

Options:

A.

accountable for the affected processes.

B.

members of senior management.

C.

authorized to select risk mitigation options.

D.

independent from the business operations.

Buy Now
Question # 106

Risk management strategies are PRIMARILY adopted to:

Options:

A.

take necessary precautions for claims and losses.

B.

achieve acceptable residual risk levels.

C.

avoid risk for business and IT assets.

D.

achieve compliance with legal requirements.

Buy Now
Question # 107

Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?

Options:

A.

The business case for the use of loT

B.

The loT threat landscape

C.

Policy development for loT

D.

The network that loT devices can access

Buy Now
Question # 108

Who is responsible for IT security controls that are outsourced to an external service provider?

Options:

A.

Organization ' s information security manager

B.

Organization ' s risk function

C.

Service provider ' s IT management

D.

Service provider ' s information security manager

Buy Now
Question # 109

Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?

Options:

A.

Aligning business unit risk responses to organizational priorities

B.

Determining attack likelihood per business unit

C.

Adjusting business unit risk tolerances

D.

Customizing incident response plans for each business unit

Buy Now
Question # 110

Who should be responsible for strategic decisions on risk management?

Options:

A.

Chief information officer (CIO)

B.

Executive management team

C.

Audit committee

D.

Business process owner

Buy Now
Question # 111

Which of the following is the BEST indication of the effectiveness of a business continuity program?

Options:

A.

Business continuity tests are performed successfully and issues are addressed.

B.

Business impact analyses are reviewed and updated in a timely manner.

C.

Business continuity and disaster recovery plans are regularly updated.

D.

Business units are familiar with the business continuity plans and process.

Buy Now
Question # 112

Which of the following describes the relationship between risk appetite and risk tolerance?

Options:

A.

Risk appetite is completely independent of risk tolerance.

B.

Risk tolerance is used to determine risk appetite.

C.

Risk appetite and risk tolerance are synonymous.

D.

Risk tolerance may exceed risk appetite.

Buy Now
Question # 113

Which of the following BEST indicates that an organization ' s disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?

Options:

A.

An experienced and certified disaster recovery team

B.

A record of quarterly disaster recovery tests

C.

A comprehensive list of critical applications

D.

A defined recovery point objective (RPO)

Buy Now
Question # 114

Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?

Options:

A.

Changes in the organization ' s risk appetite and risk tolerance levels

B.

Impact due to changes in external and internal risk factors

C.

Changes in residual risk levels against acceptable levels

D.

Gaps in best practices and implemented controls across the industry

Buy Now
Question # 115

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

Options:

A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

Buy Now
Question # 116

Options:

A.

Business information security officer

B.

Service level manager

C.

Business process manager

D.

Data center operations manager

Buy Now
Question # 117

Which of the following BEST helps to identify significant events that could impact an organization?

Vulnerability analysis

Options:

A.

Control analysis

B.

Scenario analysis

C.

Heat map analysis

Buy Now
Question # 118

Which of the following is the BEST indicator of an effective IT security awareness program?

Options:

A.

Decreased success rate of internal phishing tests

B.

Decreased number of reported security incidents

C.

Number of disciplinary actions issued for security violations

D.

Number of employees that complete security training

Buy Now
Question # 119

Which of the following is MOST essential for an effective change control environment?

Options:

A.

Business management approval of change requests

B.

Separation of development and production environments

C.

Requirement of an implementation rollback plan

D.

IT management review of implemented changes

Buy Now
Question # 120

During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?

Options:

A.

Compare the residual risk to the current risk appetite.

B.

Recommend risk remediation of the ineffective controls.

C.

Implement key control indicators (KCIs).

D.

Escalate the control failures to senior management.

Buy Now
Question # 121

A recent regulatory requirement has the potential to affect an organization ' s use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

Options:

A.

Conduct a gap analysis.

B.

Terminate the outsourcing agreement.

C.

Identify compensating controls.

D.

Transfer risk to the third party.

Buy Now
Question # 122

A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?

Options:

A.

Undertake control self-assessments (CSAs)

B.

Require reports from staff with multiple duties

C.

Obtain independent analysis of transaction logs

D.

Assign activities to fewer employees

Buy Now
Question # 123

An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?

Options:

A.

Acceptance

B.

Avoidance

C.

Transfer

D.

Reduction

Buy Now
Question # 124

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:

Options:

A.

IT policy exceptions granted.

B.

Senior management approvals.

C.

Key technology controls covered by IT policies.

D.

Processes covered by IT policies.

Buy Now
Question # 125

An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner ' s BEST course of action?

Options:

A.

Perform an impact assessment.

B.

Perform a penetration test.

C.

Request an external audit.

D.

Escalate the risk to senior management.

Buy Now
Question # 126

When assessing the maturity level of an organization ' s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

Options:

A.

Reliance on qualitative analysis methods

B.

Lack of a governance, risk, and compliance (GRC) tool

C.

Lack of senior management involvement

D.

Use of multiple risk registers

Buy Now
Question # 127

Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?

Options:

A.

Informed consent

B.

Cross border controls

C.

Business impact analysis (BIA)

D.

Data breach protection

Buy Now
Question # 128

A risk practitioner is evaluating policies defined by an organization as part of its IT security framework. Which of the following would be of GREATEST concern?

Options:

A.

Lack of alignment with global security standards

B.

Inadequate policy enforcement

C.

Lack of a single repository for security procedures

D.

Increased cost for policy adoption

Buy Now
Question # 129

An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:

Options:

A.

procedures to monitor the operation of controls.

B.

a tool for monitoring critical activities and controls.

C.

real-time monitoring of risk events and control exceptions.

D.

monitoring activities for all critical assets.

E.

Perform a controls assessment.

Buy Now
Question # 130

An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?

Options:

A.

Risk profile

B.

Risk tolerance

C.

Risk capacity

D.

Risk appetite

Buy Now
Question # 131

Which of the following is the MOST important reason to create risk scenarios?

Options:

A.

To assist with risk identification

B.

To determine risk tolerance

C.

To determine risk appetite

D.

To assist in the development of risk responses

Buy Now
Question # 132

Which of the following provides a risk practitioner with the MOST reliable evidence of a third party ' s ability to protect the confidentiality of sensitive corporate information?

Options:

A.

A signed nondisclosure agreement (NDA)

B.

Control self-assessment (CSA) results

C.

External audit reports

D.

Internal audit reports

Buy Now
Question # 133

Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?

Options:

A.

Exposure of log data

B.

Lack of governance

C.

Increased number of firewall rules

D.

Lack of agreed-upon standards

Buy Now
Question # 134

An organization ' s risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?

Options:

A.

Analyzing the residual risk components

B.

Performing risk prioritization

C.

Validating the risk appetite level

D.

Conducting a risk assessment

Buy Now
Question # 135

Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?

Options:

A.

Number of active nodes

B.

Blockchain size in gigabytes

C.

Average transaction speed

D.

Number of validated transactions

Buy Now
Question # 136

Which of the following is the MOST important component in a risk treatment plan?

Options:

A.

Technical details

B.

Target completion date

C.

Treatment plan ownership

D.

Treatment plan justification

Buy Now
Question # 137

Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?

Options:

A.

Ensuring processes are documented to enable effective control execution

B.

Ensuring regular risk messaging is Included in business communications from leadership

C.

Ensuring schedules and deadlines for control-related deliverables are strictly monitored

D.

Ensuring performance metrics balance business goals with risk appetite

Buy Now
Question # 138

Which of the following sources is MOST relevant to reference when updating security awareness training materials?

Options:

A.

Risk management framework

B.

Risk register

C.

Global security standards

D.

Recent security incidents reported by competitors

Buy Now
Question # 139

Which of the following should be the PRIMARY focus of a disaster recovery management (DRM) framework and related processes?

Options:

A.

Restoring IT and cybersecurity operations

B.

Assessing the impact and probability of disaster scenarios

C.

Ensuring timely recovery of critical business operations

D.

Determining capacity for alternate sites

Buy Now
Question # 140

Which of the following is the BEST way to address IT regulatory compliance risk?

Options:

A.

Assign highest priority to remediation of related risk scenarios.

B.

Prevent acceptance of related risk scenarios.

C.

Conduct specialized business impact analyses (BIAs).

D.

Manage risk like other types of operational risk.

Buy Now
Question # 141

Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization ' s IT systems via personal or public computers?

Options:

A.

Risk appetite

B.

Inherent risk

C.

Key risk indicator (KRI)

D.

Risk tolerance

Buy Now
Question # 142

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

Options:

A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Buy Now
Question # 143

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?

Options:

A.

Better understanding of the risk appetite

B.

Improving audit results

C.

Enabling risk-based decision making

D.

Increasing process control efficiencies

Buy Now
Question # 144

Within the system development life cycle (SDLC), controls should be specified during:

Options:

A.

project initiation

B.

business case development.

C.

system integration testing.

D.

requirements definition.

Buy Now
Question # 145

Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?

Options:

A.

Number of projects going live without a security review

B.

Number of employees completing project-specific security training

C.

Number of security projects started in core departments

D.

Number of security-related status reports submitted by project managers

Buy Now
Question # 146

A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?

Options:

A.

Peak demand on the cloud service during business hours

B.

Percentage of technology upgrades resulting in security breaches

C.

Number of incidents with downtime exceeding contract threshold

D.

Percentage of servers not patched per policy

Buy Now
Question # 147

Which of the following is a risk practitioner ' s BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

Options:

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Buy Now
Question # 148

An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system ' s production readiness?

Options:

A.

Limited organizational knowledge of the underlying technology

B.

Lack of commercial software support

C.

Varying costs related to implementation and maintenance

D.

Slow adoption of the technology across the financial industry

Buy Now
Question # 149

Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?

Options:

A.

Costs and benefits

B.

Local laws and regulations

C.

Security features and support

D.

Business strategies and needs

Buy Now
Question # 150

Which of the following BEST indicates that additional or improved controls ate needed m the environment?

Options:

A.

Management, has decreased organisational risk appetite

B.

The risk register and portfolio do not include all risk scenarios

C.

merging risk scenarios have been identified

D.

Risk events and losses exceed risk tolerance

Buy Now
Question # 151

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

Options:

A.

avoided.

B.

accepted.

C.

mitigated.

D.

transferred.

Buy Now
Question # 152

To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority ' ?

Options:

A.

Local authorities and regulators

B.

Ethics and compliance team

C.

Senior management

D.

Internal audit team

Buy Now
Question # 153

Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?

Options:

A.

Risk magnitude

B.

Incident probability

C.

Risk appetite

D.

Cost-benefit analysis

Buy Now
Exam Code: CRISC
Exam Name: Certified in Risk and Information Systems Control
Last Update: Apr 29, 2026
Questions: 1938
CRISC pdf

CRISC PDF

$25.5  $84.99
CRISC Engine

CRISC Testing Engine

$28.5  $94.99
CRISC PDF + Engine

CRISC PDF + Testing Engine

$40.5  $134.99