ISACA CRISC Certified in Risk and Information Systems Control Online Training
ISACA CRISC Online Training
The questions for CRISC were last updated at Nov 23,2024.
- Exam Code: CRISC
- Exam Name: Certified in Risk and Information Systems Control
- Certification Provider: ISACA
- Latest update: Nov 23,2024
Which of the following is the BEST method for assessing control effectiveness?
- A . Ad hoc control reporting
- B . Control self-assessment
- C . Continuous monitoring
- D . Predictive analytics
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
- A . create an action plan
- B . assign ownership
- C . review progress reports
- D . perform regular audits.
During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT .
Which of the following is the BEST way for the risk practitioner to address these concerns?
- A . Describe IT risk scenarios in terms of business risk.
- B . Recommend the formation of an executive risk council to oversee IT risk.
- C . Provide an estimate of IT system downtime if IT risk materializes.
- D . Educate business executives on IT risk concepts.
Which of the following would BEST help to ensure that identified risk is efficiently managed?
- A . Reviewing the maturity of the control environment
- B . Regularly monitoring the project plan
- C . Maintaining a key risk indicator for each asset in the risk register
- D . Periodically reviewing controls per the risk treatment plan
Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?
- A . Identify the potential risk.
- B . Monitor employee usage.
- C . Assess the potential risk.
- D . Develop risk awareness training.
Which of the following is the BEST way to identify changes to the risk landscape?
- A . Internal audit reports
- B . Access reviews
- C . Threat modeling
- D . Root cause analysis
In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?
- A . Risk questionnaire
- B . Risk register
- C . Management assertion
- D . Compliance manual
The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:
- A . implement uniform controls for common risk scenarios.
- B . ensure business unit risk is uniformly distributed.
- C . build a risk profile for management review.
- D . quantify the organization’s risk appetite.
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization’s security incident handling process?
- A . The number of security incidents escalated to senior management
- B . The number of resolved security incidents
- C . The number of newly identified security incidents
- D . The number of recurring security incidents
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
- A . Sensitivity analysis
- B . Level of residual risk
- C . Cost-benefit analysis
- D . Risk appetite