ISACA CRISC Certified in Risk and Information Systems Control Online Training
ISACA CRISC Online Training
The questions for CRISC were last updated at Nov 23,2024.
- Exam Code: CRISC
- Exam Name: Certified in Risk and Information Systems Control
- Certification Provider: ISACA
- Latest update: Nov 23,2024
During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards.
The overall control environment may still be effective if:
- A . compensating controls are in place.
- B . a control mitigation plan is in place.
- C . risk management is effective.
- D . residual risk is accepted.
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?
- A . The risk practitioner
- B . The business process owner
- C . The risk owner
- D . The control owner
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches .
Which of the following elements of the risk register is MOST important to update to reflect this change?
- A . Risk impact
- B . Risk trend
- C . Risk appetite
- D . Risk likelihood
Which of the following would BEST provide early warning of a high-risk condition?
- A . Risk register
- B . Risk assessment
- C . Key risk indicator (KRI)
- D . Key performance indicator (KPI)
What is the BEST information to present to business control owners when justifying costs related to controls?
- A . Loss event frequency and magnitude
- B . The previous year’s budget and actuals
- C . Industry benchmarks and standards
- D . Return on IT security-related investments
Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?
- A . impact due to failure of control
- B . Frequency of failure of control
- C . Contingency plan for residual risk
- D . Cost-benefit analysis of automation
An organization has determined a risk scenario is outside the defined risk tolerance level .
What should be the NEXT course of action?
- A . Develop a compensating control.
- B . Allocate remediation resources.
- C . Perform a cost-benefit analysis.
- D . Identify risk responses
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization.
Which of the following i< the MOST important topic to cover in this training?
- A . Applying risk appetite
- B . Applying risk factors
- C . Referencing risk event data
- D . Understanding risk culture
Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
- A . Perform an m-depth code review with an expert
- B . Validate functionality by running in a test environment
- C . Implement a service level agreement.
- D . Utilize the change management process.
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
- A . Percentage of mitigated risk scenarios
- B . Annual loss expectancy (ALE) changes
- C . Resource expenditure against budget
- D . An up-to-date risk register