Isaca Certified in Risk and Information Systems Control CRISC Exam Practice Test

Page: 1 / 14
Total 1810 questions
Question 1

Which of the following risk register updates is MOST important for senior management to review?



Answer : C

A risk register is a document that records and tracks the information and status of the identified risks and their responses. It includes the risk description, category, source, cause, impact, probability, priority, response, owner, action plan, status, etc.

A risk register update is a change or modification to the information or status of the risks and their responses in the risk register. It may be triggered by the occurrence or resolution of a risk event, the identification or evaluation of a new or emerging risk, the implementation or completion of a risk response, the monitoring or review of the risk performance, etc.

The most important risk register update for senior management to review is avoiding a risk that was previously accepted, which means that the organization has decided to eliminate or withdraw from the risk exposure or activity that may cause the risk, instead of tolerating or retaining the risk as before. This may indicate a significant change in the organization's risk appetite, strategy, objectives, or environment, and it may have a major impact on the organization's performance and value.

The other options are not the most important risk register updates for senior management to review, because they do not indicate a significant change or impact on the organization's risk profile or performance.

Extending the date of a future action plan by two months means that the organization has postponed the implementation or completion of the planned actions or measures to address the risk, due to some reasons or constraints. This may indicate a delay or deviation from the expected or desired risk outcome, but it may not have a major impact on the organization's performance and value, unless the risk is very urgent or critical.

Retiring a risk scenario no longer used means that the organization has removed or discarded the risk scenario that is no longer relevant or applicable to the organization's objectives or operations, due to some changes or developments. This may indicate a reduction or improvement in the organization's risk exposure or level, but it may not have a major impact on the organization's performance and value, unless the risk scenario was very significant or influential.

Changing a risk owner means that the organization has assigned or transferred the responsibility and accountability for the risk and its response to a different person or role, due to some reasons or circumstances. This may indicate a change or improvement in the organization's risk governance or culture, but it may not have a major impact on the organization's performance and value, unless the risk owner was very ineffective or inappropriate.Reference=

ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 19-20, 23-24, 27-28, 31-32, 40-41, 47-48, 54-55, 58-59, 62-63

ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 160

CRISC Practice Quiz and Exam Prep


Question 2

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?



Answer : A

According to the CRISC Review Manual1, risk tolerance is the acceptable level of variation that management is willing to allow for any particular risk as it pursues its objectives. Risk tolerance provides a helpful reference point when communicating the results of a risk assessment to stakeholders, as it helps to compare the current level of risk exposure with the desired level of risk exposure, and to prioritize and allocate resources for risk response.Risk tolerance also helps to align the risk assessment results with the stakeholder expectations and preferences, and to facilitate risk-based decision making.Reference= CRISC Review Manual1, page 192.


Question 3

In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?



Answer : A


Question 4

Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?



Answer : B

Business impact analysis (BIA) is the most useful analysis for prioritizing risk scenarios associated with loss of IT assets, because it evaluates the potential consequences of disruption tocritical business functions and processes. BIA helps to identify the most significant risks and the most urgent recovery needs. SWOT analysis, cost-benefit analysis, and root cause analysis are all useful tools for different purposes, but they do not directly address the impact of risk scenarios on business continuity and resilience. Reference = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.2.1, page 143


Question 5

A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:



Answer : A

A policy exception is a deviation from the established policies, standards, or procedures of the enterprise, such as the information security policy. A policy exception may be granted by the management when there is a valid business reason or justification for the deviation, and when the risk associated with the deviation is acceptable or mitigated. The best course of action when a business unit has decided to accept the risk of implementing an off-the-shelf, commercialsoftware package that uses weak password controls is to obtain management approval for policy exception. This will ensure that the business unit is aware of the implications and consequences of the policy exception, and that the management agrees with the risk acceptance and approves the policy exception. The other options are not the best course of action, as they involve different risk response strategies or outcomes:

Develop an improved password software routine means that the business unit modifies or enhances the password controls of the software package, such as by increasing the password length, complexity, or expiration. This may not be a feasible or effective way to address the risk of weak password controls, as it may violate the terms and conditions of the software vendor, or may not be compatible or consistent with the software package.

Select another application with strong password controls means that the business unit replaces the software package with another application that has better password controls, such as by using encryption, authentication, or authorization. This may not be a desirable or efficient way to address the risk of weak password controls, as it may incur additional costs, delays, or complexities, or may not meet the business requirements or expectations of the business unit.

Continue the implementation with no changes means that the business unit proceeds with the software package without any modifications or improvements to the password controls, or without any approval or documentation of the policy exception. This may not be a responsible or ethical way to address the risk of weak password controls, as it may expose the enterprise to legal, financial, or reputational risks, or may compromise the security or compliance of the enterprise.Reference= Risk and Information Systems Control Study Manual, 7th Edition, Chapter 3, Section 3.4.1.1, pp. 121-122.


Question 6

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?



Answer : A

The first thing that should be done when addressing security concerns associated with a new Internet of Things (IoT) solution is to develop new IoT risk scenarios. IoT is a network of physical devices, such as sensors, cameras, appliances, etc., that are connected to the internet and can collect, process, and exchange data. IoT introduces new security concerns, such as privacy, confidentiality, integrity, availability,and accountability of the data and devices, as well as new threats and vulnerabilities, such as unauthorized access, manipulation, or disruption of the data and devices. Developing new IoT risk scenarios is the first thing that should be done, because it helps to identify, analyze, and evaluate the potential risks that could affect the IoT solution's objectives or operations. Developing new IoT risk scenarios also helps to select the most appropriate and effective controls to minimize the risks, such as avoiding, reducing, transferring, or accepting the risks. The other options are not the first thing that should be done, although theymay be part of or derived from the IoT risk scenarios. Implementing IoT device monitoring software, introducing controls to the new threat environment, and engaging external security reviews are all activities that can help to support or improve the security of the IoT solution, but they do not necessarily identify, analyze, or evaluate the risks that could affect the IoT solution.Reference=1


Question 7

Which of the following is MOST important for an organization to have in place when developing a risk management framework?



Answer : A

The most important thing for an organization to have in place when developing a risk management framework is a strategic approach to risk including an established risk appetite, as this provides the direction, scope, and objectives of the risk management process, and defines the level of risk that the organization is willing to accept or avoid in pursuit of its goals. A strategic approach to risk aligns the risk management framework with the organization's vision, mission, values, and strategy, and ensures that the risk management activities support the achievement of the desired outcomes. An established risk appetite sets the boundaries and criteria for risk decision making, and guides the selection and implementation of risk responses. The other options are not the most important things for an organization to have in place when developing a risk management framework, although they may be useful or necessary components of it. A risk-based internal audit plan is a tool that helps to evaluate and improve the effectiveness of the risk management framework, but it does not define or drive the risk management process. A control function within the risk management team is a role that helps to implement and monitor the risk controls, but it does not determine or influence the risk strategy or appetite. An organization-wide risk awareness training program is a method that helps to enhance the risk culture and competence of the organization, but it does not establish or communicate the risk approach or appetite.Reference= Risk and Information Systems Control Study Manual, Chapter 1: IT Risk Identification, page 23.


Page:    1 / 14   
Total 1810 questions