Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

CRISC Exam Dumps - Isaca Certification Questions and Answers

Question # 304

Which of the following is the MOST effective way to minimize the impact associated with the loss of key employees?

Options:

A.

Maintain and publish a RACI chart.

B.

Promote incentive programs.

C.

Perform succession planning.

D.

Develop a robust onboarding program.

Buy Now
Question # 305

Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?

Options:

A.

Creating metrics to track remote connections

B.

Updating the organizational policy for remote access

C.

Updating remote desktop software

D.

Implementing multi-factor authentication

Buy Now
Question # 306

Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?

Options:

A.

Corrective

B.

Preventive

C.

Detective

D.

Deterrent

Buy Now
Question # 307

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

Options:

A.

The percentage of servers with allowed patching exceptions

B.

The number of servers with local credentials to install patches

C.

The percentage of servers patched within required service level agreements

D.

The number of servers running the software patching service

Buy Now
Question # 308

Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?

Options:

A.

Identify any new business objectives with stakeholders.

B.

Present a business case for new controls to stakeholders.

C.

Revise the organization ' s risk and control policy.

D.

Review existing risk scenarios with stakeholders.

Buy Now
Question # 309

Which of the following is MOST helpful to review when assessing the risk exposure associated with ransomware?

Options:

A.

Potentially impacted business processes

B.

Recent changes in the environment

C.

Key performance indicators (KPIs)

D.

Suspected phishing events

Buy Now
Question # 310

A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?

Options:

A.

Risk likelihood

B.

Risk impact

C.

Risk capacity

D.

Risk appetite

Buy Now
Question # 311

A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?

Options:

A.

Risk impact

B.

Key risk indicator (KRI)

C.

Risk appetite

D.

Risk likelihood

Buy Now
Question # 312

The BEST way for an organization to ensure that servers are compliant to security policy is

to review:

Options:

A.

change logs.

B.

configuration settings.

C.

server access logs.

D.

anti-malware compliance.

Buy Now
Question # 313

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

Options:

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Buy Now
Question # 314

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

Options:

A.

Number of training sessions completed

B.

Percentage of staff members who complete the training with a passing score

C.

Percentage of attendees versus total staff

D.

Percentage of staff members who attend the training with positive feedback

Buy Now
Question # 315

Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s software testing program?

Options:

A.

Average time to complete software test cases

B.

Percentage of applications with defined business cases

C.

Number of incidents resulting from software changes

D.

Percentage of staff completing software development training

Buy Now
Question # 316

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner ' s NEXT step?

Options:

A.

Develop a mechanism for monitoring residual risk.

B.

Update the risk register with the results.

C.

Prepare a business case for the response options.

D.

Identify resources for implementing responses.

Buy Now
Question # 317

During the creation of an organization ' s IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:

Options:

A.

Interviewing data owners

B.

Reviewing risk response plans with internal audit

C.

Developing a risk monitoring process

D.

Reviewing an external risk assessment

Buy Now
Question # 318

An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?

Options:

A.

Identify systems that are vulnerable to being exploited by the attack.

B.

Confirm with the antivirus solution vendor whether the next update will detect the attack.

C.

Verify the data backup process and confirm which backups are the most recent ones available.

D.

Obtain approval for funding to purchase a cyber insurance plan.

Buy Now
Question # 319

A multinational organization is considering implementing standard background checks to ' all new employees A KEY concern regarding this approach

Options:

A.

fail to identity all relevant issues.

B.

be too costly

C.

violate laws in other countries

D.

be too line consuming

Buy Now
Question # 320

Which of the following should a risk practitioner do NEXT after learning that Internet of Things (IoT) devices installed in the production environment lack appropriate security controls for sensitive data?

Options:

A.

Recommend device management controls.

B.

Enable role-based access control (RBAC).

C.

Assess the threat and associated impact.

D.

Evaluate risk appetite and tolerance levels.

Buy Now
Question # 321

Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?

Options:

A.

Performing a vulnerability assessment on the loT devices

B.

Designing loT architecture with IT security controls from the start

C.

Implementing key risk indicators (KRIs) for loT devices

D.

To ensure risk trend data is collected and reported

Buy Now
Question # 322

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

Options:

A.

Percentage of business users completing risk training

B.

Percentage of high-risk scenarios for which risk action plans have been developed

C.

Number of key risk indicators (KRIs) defined

D.

Time between when IT risk scenarios are identified and the enterprise ' s response

Buy Now
Question # 323

What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?

Options:

A.

Review regular control testing results.

B.

Recommend a penetration test.

C.

Assess the risk to determine mitigation needed.

D.

Analyze key performance indicators (KPIs).

Buy Now
Question # 324

A data privacy regulation has been revised to incorporate more stringent requirements for personal data protection. Which of the following provides the MOST important input to help ensure compliance with the revised regulation?

Options:

A.

Gap analysis

B.

Current control attestation

C.

Risk profile update

D.

Business impact analysis (BIA)

Buy Now
Question # 325

Which of the following is the BEST method to track asset inventory?

Options:

A.

Periodic asset review by management

B.

Asset registration form

C.

Automated asset management software

D.

IT resource budgeting process

Buy Now
Question # 326

After the implementation of internal of Things (IoT) devices, new risk scenarios were identified. What is the PRIMARY reason to report this information to risk owners?

Options:

A.

To reevaluate continued use to IoT devices

B.

The add new controls to mitigate the risk

C.

The recommend changes to the IoT policy

D.

To confirm the impact to the risk profile

Buy Now
Question # 327

Which of the following BEST facilitates the identification of emerging risk?

Options:

A.

Performing scenario-based assessments

B.

Reviewing audit reports annually

C.

Conducting root cause analyses

D.

Engaging a risk-focused audit team

Buy Now
Question # 328

A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?

Options:

A.

Monitor the databases for abnormal activity

B.

Approve exception to allow the software to continue operating

C.

Require the software vendor to remediate the vulnerabilities

D.

Accept the risk and let the vendor run the software as is

Buy Now
Question # 329

Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?

Options:

A.

Regional competitors ' policies and standards

B.

Ability to monitor and enforce compliance

C.

Industry-standard templates

D.

Differences in regulatory requirements

Buy Now
Question # 330

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

Options:

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Buy Now
Question # 331

Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?

Options:

A.

System owner

B.

Internal auditor

C.

Process owner

D.

Risk owner

Buy Now
Question # 332

Which of the following would BEST help to ensure that suspicious network activity is identified?

Options:

A.

Analyzing intrusion detection system (IDS) logs

B.

Analyzing server logs

C.

Using a third-party monitoring provider

D.

Coordinating events with appropriate agencies

Buy Now
Question # 333

Which of the following would provide the MOST useful information for communicating an organization’s risk level to senior management?

Options:

A.

A list of organizational threats

B.

A high-level risk map

C.

Specialized risk publications

D.

A list of organizational vulnerabilities

Buy Now
Question # 334

A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?

Options:

A.

The audit had a broader scope than the CSA.

B.

The CSA was not sample-based.

C.

The CSA did not test control effectiveness.

D.

The CSA was compliance-based, while the audit was risk-based.

Buy Now
Question # 335

Which of the following is the PRIMARY consideration when determining the impact to an organization after the discovery of malware on an endpoint device?

Options:

A.

Asset criticality and sensitivity

B.

Currency of anti-malware signatures

C.

Availability of patches and security updates

D.

Currency of the incident response plan

Buy Now
Question # 336

An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?

Options:

A.

The organization ' s business process owner

B.

The organization ' s information security manager

C.

The organization ' s vendor management officer

D.

The vendor ' s risk manager

Buy Now
Question # 337

A risk practitioner has identified that the organization ' s secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?

Options:

A.

Business continuity director

B.

Disaster recovery manager

C.

Business application owner

D.

Data center manager

Buy Now
Question # 338

Which of the following is the GREATEST benefit of involving business owners in risk scenario development?

Options:

A.

Business owners have the ability to effectively manage risk.

B.

Business owners have authority to approve control implementation.

C.

Business owners understand the residual risk of competitors.

D.

Business owners are able to assess the impact.

Buy Now
Question # 339

Which of the following is the BEST indicator of the effectiveness of a control action plan ' s implementation?

Options:

A.

Increased number of controls

B.

Reduced risk level

C.

Increased risk appetite

D.

Stakeholder commitment

Buy Now
Question # 340

Which of the following is MOST important when creating a program to reduce ethical risk?

Options:

A.

Defining strict policies

B.

Developing an organizational communication plan

C.

Conducting a gap analysis

D.

Obtaining senior management commitment

Buy Now
Question # 341

What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?

Options:

A.

Use the severity rating to calculate risk.

B.

Classify the risk scenario as low-probability.

C.

Use the highest likelihood identified by risk management.

D.

Rely on range-based estimates provided by subject-matter experts.

Buy Now
Question # 342

The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:

Options:

A.

vulnerability scans.

B.

recurring vulnerabilities.

C.

vulnerabilities remediated,

D.

new vulnerabilities identified.

Buy Now
Question # 343

Within the three lines of defense model, the responsibility for managing risk and controls resides with:

Options:

A.

operational management.

B.

the risk practitioner.

C.

the internal auditor.

D.

executive management.

Buy Now
Question # 344

Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?

Options:

A.

Qualitative measures for potential loss events

B.

Changes in owners for identified IT risk scenarios

C.

Changes in methods used to calculate probability

D.

Frequent use of risk acceptance as a treatment option

Buy Now
Question # 345

Which of the following has the GREATEST influence on an organization ' s risk appetite?

Options:

A.

Threats and vulnerabilities

B.

Internal and external risk factors

C.

Business objectives and strategies

D.

Management culture and behavior

Buy Now
Question # 346

During a risk assessment, what should an assessor do after identifying threats to organizational assets?

Options:

A.

Request funding for the security program

B.

Determine threats to be reported to upper management

C.

Implement controls to achieve target risk levels

D.

Evaluate the controls currently in place

Buy Now
Question # 347

Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?

Options:

A.

Cyber threat intelligence

B.

Anti-malware software

C.

Endpoint detection and response (EDR)

D.

SIEM systems

Buy Now
Question # 348

An IT risk practitioner ' s report includes a treatment plan and projected risk ratings if recommendations are implemented. Once corrective actions are taken by the system owner, which of the following types of risk will the projected risk become?

Options:

A.

Control

B.

Inherent

C.

Residual

D.

Compliance

Buy Now
Question # 349

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

Options:

A.

Transfer

B.

Mitigation

C.

Avoidance

D.

Acceptance

Buy Now
Question # 350

Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?

Options:

A.

Identifying users who have access

B.

Selecting an encryption solution

C.

Defining the data retention period

D.

Determining the value of data

Buy Now
Question # 351

A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner ' s BEST course of action?

Options:

A.

Determine changes in the risk level.

B.

Outsource the vulnerability management process.

C.

Review the patch management process.

D.

Add agenda item to the next risk committee meeting.

Buy Now
Question # 352

Which of the following observations would be the GREATEST concern to a risk practitioner evaluating an organization ' s risk management practices?

Options:

A.

Senior management has approved numerous requests for risk acceptance.

B.

Business leaders provide final approval for information security policies.

C.

Several risk scenarios have action plans spanning multiple years.

D.

Senior management does not set risk tolerance.

Buy Now
Question # 353

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

Options:

A.

The value at which control effectiveness would fail

B.

Thresholds benchmarked to peer organizations

C.

A typical operational value

D.

A value that represents the intended control state

Buy Now
Exam Code: CRISC
Exam Name: Certified in Risk and Information Systems Control
Last Update: Apr 29, 2026
Questions: 1938
CRISC pdf

CRISC PDF

$25.5  $84.99
CRISC Engine

CRISC Testing Engine

$28.5  $94.99
CRISC PDF + Engine

CRISC PDF + Testing Engine

$40.5  $134.99