Crisc Dump
Crisc Dump
1 Which of the following is MOST important for an organization that wants to reduce IT
operational risk?
Answer: C
Q.No.2 Deviation from a mitigation action plan's completion date should be determined by
which of the following?
Answer: C
Q.No.3 A business unit has decided to accept the risk of implementing an off-the-shelf,
commercial software package that uses weak password controls. What is the BEST course of
action?
Answer: D
Q.No.4 Which of the following is the PRIMARY reason to have the risk management process
reviewed by a third party?
Answer: B
Q.No.5 In an organization dependent on data analytics to drive decision-making, which of the
following would BEST help to minimize the risk associated with inaccurate data?
Answer: B
Answer: B
Answer: A
Q.No.8 Which of the following will BEST help in communicating strategic risk priorities?
A. Heat map
B. Business impact analysis (BIA)
C. Balanced Scorecard
D. Risk register
Answer: C
Q.No.9 Which of the following is the BEST indicator of the effectiveness of a control action
plan's implementation?
A. Stakeholder commitment
B. Increased risk appetite
C. Reduced risk level
D. Increased number of controls
Answer: C
Q.No.10 Which of the following is the BEST method for identifying vulnerabilities?
Answer: D
Q.No.11 Which of the following will BEST ensure that information security risk factors are
mitigated when developing in-house applications?
Answer: D
A. Tolerance.
B. culture.
C. Management.
D. analysis.
Answer: B
Q.No.13 During a control review, the control owner states that an existing control has
deteriorated over time. What is the BEST recommendation to the control owner?
Answer: C
Q.No.14 Which of the following is the BEST approach for determining whether a risk action
plan is effective?
Answer: A
Q.No.15 Who is responsible for IT security controls that are outsourced to an external service
provider?
Answer: B
Q.No.16 Which of the following approaches will BEST help to ensure the effectiveness of risk
awareness training?
Answer: D
Answer: D
Q.No.18 When reviewing a risk response strategy, senior management's PRIMARY focus
should be placed on the:
A. cost-benefit analysis.
B. key performance indicators (KPIs).
C. investment portfolio
D. alignment with risk appetite.
Answer: D
Q.No.19 The effectiveness of a control has decreased. What is the MOST likely effect on the
associated risk?
Answer: D
Q.No.20 The BEST way to obtain senior management support for investment in a control
implementation would be to articulate the reduction in:
A. Vulnerabilities
B. residual risk.
C. inherent risk.
D. detected incidents.
Answer: C
Q.No.21 During an IT department reorganization, the manager of a risk mitigation action plan
was replaced. The new manager has begun implementing a new control after identifying a
more effective option. Which of the following is the risk practitioner's BEST course of action?
Answer: A
Q.No.22 An organization is planning to acquire a new financial system. Which of the following
stakeholders would provide the MOST relevant information for analyzing the risk associated
with the new IT solution?
A. Internal auditor
B. Process owner
C. Project sponsor
D. Risk manager
Answer: B
Answer: C
Q.No.24 An organization has outsourced a critical process involving highly regulated data to a
third party with servers located in a foreign country. Who is accountable for the confidentiality
of this data?
Answer: D
Q.No.25 Which of the following would qualify as a key performance indicator (KPD)?
Answer: D
Answer: D
A. systems administrator.
B. database administrator.
C. chief information officer.
D. business process owner.
Answer: D
Answer: A
Q.No.29 Which of the following is the BEST way to identify changes in the risk profile of an
organization?
Answer: D
Q.No.31 Which of the following should be considered FIRST when assessing risk associated
with the adoption of emerging technologies?
A. Organizational strategy
B. Cost-benefit analysis
C. Control self-assessment (CSA)
D. Business requirements
Answer: A
Q.No.32 The PRIMARY benefit of conducting continuous monitoring of access controls is the
ability to identify:
Answer: A
Q.No.33 Which of the following MOST effectively limits the impact of a ransomware attack?
A. Cyber insurance
B. Cryptocurrency reserve
C. Data backups
D. End user training
Answer: C
Q.No.34 To communicate the risk associated with IT in business terms, which of the following
MUST be defined?
A. Compliance objectives
B. Organizational objectives
C. Risk appetite of the organization
D. Inherent and residual risk
Answer: B
Q.No.35 Which of the following is the MOST important objective of embedding risk
management practices into the initiation phase of the project management life cycle?
Answer: D
Answer: D
Q.No.37 An organization operates in a jurisdiction where heavy fines are imposed for leakage
of customer data. Which of the following provides the BEST input to assess the inherent risk
impact?
Answer: B
Q.No.38 An organization's risk practitioner learns a new third-party system on the corporate
network has introduced vulnerabilities that could compromise corporate IT systems. What
should the risk practitioner do FIRST?
Answer: B
Q.No.39 Which of the following is the MOST important component of effective security
incident response?
Answer: C
Q.No.40 A control for mitigating risk in a key business area cannot be implemented
immediately. Which of the following is the risk practitioner's BEST course of action when a
compensating control needs to be applied?
Answer: B
Q.No.41 Which of the following provides the BEST measurement of an organization's risk
management maturity level?
Answer: B
Q.No.42 The BEST key performance indicator (KPI) for monitoring adherence to an
organization's user accounts provisioning practices is the percentage of:
Answer: A
Q.No.43 A recent audit identified high-risk issues in a business unit though a previous control
self-assessment (CSA) had good results. Which of the following is the MOST likely reason
for the difference?
Answer: D
Q.No.44 Which of the following is the MOST relevant information to include in a risk
management strategy?
A. Cost of controls
B. Quantified risk triggers\
C. Regulatory requirements
D. Organizational goals
Answer: D
Q.No.45 A risk assessment indicates the residual risk associated with a new bring your own
device (BYOD) program is within organizational risk tolerance. Which of the following should
the risk practitioner recommend be done NEXT?
Answer: B
Q.No.46 The MOST significant benefit of using a consistent risk ranking methodology across
an organization is that it enables:
Answer: C
Q.No.47 Which of the following is an IT business owner's BEST course of action following an
unexpected increase in emergency changes?
Answer: D
Q.No.48 Who is MOST likely to be responsible for the coordination between the IT risk
strategy and the business risk strategy?
Answer: B
Q.No.49 A risk practitioner has identified that the organization's secondary data center does
not provide redundancy for a critical application Who should have the authority to accept the
associated risk?
Answer: A
Q.No.50 A risk practitioner discovers several key documents detailing the design of a product
currently in development have been posted on the Internet. What should be the risk
practitioner's FIRST course of action?
Answer: D
Q.No.51 A change management process has recently been updated with new testing
procedures. What is the NEXT course of action?
Answer: B
Q.No.52 Which of the following is the BEST way to confirm whether appropriate automated
controls are in place within a recently implemented system?
Answer: B
Q.No.53 An IT control gap has been identified in a key process. Who would be the MOST
appropriate owner of the risk associated with this gap?
Answer: D
Q.No.54 A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT
risk and finds the risk level has increased. What is the BEST course of action?
Answer: A
Q.No.55 For no apparent reason, the time required to complete daily processing for a legacy
application is approaching a risk threshold. Which of the following activities should be
performed FIRST?
Answer: A
Q.No.56 Which of the following is the MOST effective key performance indicator (KPI) for
change management?
Answer: A
Answer: D
Q.No.58 Which of the following approaches BEST identifies information systems control
deficiencies?
A. Gap analysis
B. Countermeasures analysis
C. Best practice assessment
D. Risk assessment
Answer: A
Q.No.59 A large organization needs to report risk at all levels for a new centralized
virtualization project to reduce cost and improve performance. Which of the following would
MOST effectively represent the overall risk of the project to senior management?
Answer: D
Answer: B
Q.No.61 Which of the following is the PRIMARY objective of providing an aggregated view of
IT risk to business management?
Answer: D
Q.No.62 Which of the following is the BEST way to determine whether new controls mitigate
security gaps in a business system?
Answer: A
Q.No.63 Which of the following is the PRIMARY benefit of using an entry in the risk register to
track the aggregate risk associated with server failure?
Answer: C
Q.No.64 Which of the following should be a risk practitioner's MOST important consideration
when developing IT risk scenarios?
Answer: C
Q.No.65 Which of the following is the BEST way to promote adherence to the risk tolerance
level set by management?
Answer: B
Q.No.66 An organization has opened a subsidiary in a foreign country. Which of the following
would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
Answer: D
Q.No.67 Which of the following is MOST essential for an effective change control
environment?
Answer: B
Q.No.68 Which of the following is MOST important to have in place to ensure the
effectiveness of risk and security metrics reporting?
Answer: A
Q.No.69 The PRIMARY benefit of classifying information assets is that it helps to:
Answer: D
Q.No.70 A payroll manager discovers that fields in certain payroll reports have been modified
without authorization. Which of the following control weaknesses could have contributed
MOST to this problem?
Answer: B
A. Financial loss incurred due to malicious activities during staff members' leave
B. Number of malicious activities occurring during staff members' leave
C. Percentage of staff members seeking exception to the policy
D. Percentage of staff members taking leave according to the policy
Answer: C
Q.No.72 Which of the following is the PRIMARY reason to establish the root cause of an IT
security incident?
Answer: D
Q.No.73 During the risk assessment of an organization that processes credit cards, a number
of existing controls have been found to be ineffective and do not meet industry standards.
The overall control environment may still be effective if:
Answer: A
Q.No.74 Which of the following is the MOST important information to be communicated during
security awareness training?
Answer: B
Q.No.75 Which of the following will BEST help to ensure that information system controls are
effective?
Answer: B
Q.No.76 Once a risk owner has decided to implement a control to mitigate risk, it is MOST
important to develop:
Answer: A
Q.No.77 After migrating a key financial system to a new provider, it was discovered that a
developer could gain access to the production environment. Which of the following is
the BEST way to mitigate the risk in this situation?
Answer: B
Q.No.78 The MOST effective approach to prioritize risk scenarios is by:
Answer: A
Q.No.79 The acceptance of control costs that exceed risk exposure MOST likely
demonstrates:
Answer: A
Q.No.80 An organization's chief technology officer (CTO) has decided to accept the risk
associated with the potential loss from a denial-of-service (DoS) attack. In this situation, what
is the risk practitioner's BEST course of action?
Answer: C
Q.No.81 After identifying new risk events during a project the project manager's NEXT step
should be to:
Answer: B
Q.No.82 Which of the following is the GREATEST benefit to an organization when updates to
the risk register are made promptly after the completion of a risk assessment?
Answer: C
Q.No.83 Which of the following controls would BEST reduce the likelihood of a successful
network attack through social engineering?
A. Employee sanctions
B. Automated controls
C. Security awareness training
D. Multifactor authentication
Answer: C
Q.No.84 Who should be accountable for monitoring the control environment to ensure controls
are effective?
A. Risk owner
B. Security monitoring operations
C. Impacted data owner
D. System owner
Answer: A
Q.No.85 Which of the following techniques would be used during a risk assessment to
demonstrate to stakeholders that all known alternatives were evaluated?
A. Decision tree
B. Control chart
C. Sensitivity analysis
D. Trend analysis
Answer: A
Answer: B
Q.No.87 Which of the following data would be used when performing a business impact
analysis (BIA)?
Answer: A
Q.No.88 An organization is considering allowing users to access company data from their
personal devices. Which of the following is the MOST important factor when assessing the
risk?
Answer: D
Q.No.89 Which of the following provides the MOST helpful information in identifying risk in an
organization?
A. Risk analysis
B. Risk responses
C. Risk registers
D. Risk scenarios
Answer: D
Answer: A
Q.No.91 Which of the following would offer the MOST insight with regard to an organization's
risk culture?
Answer: D
A. risk scenario.
B. RACI matrix.
C. risk catalog.
D. risk register.
Answer: D
Q.No.93 Which of the following is the MOST important data attribute of key risk indicators
(KRIs)?
Answer: A
Q.No.94 Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:
Answer: C
Q.No.95 Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
A. Senior management
B. Project manager
C. Project sponsor
D. IT risk manager
Answer: A
Q.No.96 Controls should be defined during the design phase of system development
because:
Answer: A
Q.No.97 When reviewing a business continuity plan (BCP), which of the following would be
the MOST significant deficiency?
Answer: D
Q.No.98 Which of the following is a risk practitioner's BEST course of action upon learning
that a control under internal review may no longer be necessary?
Answer: C
Q.No.99 Which of these documents is MOST important to request from a cloud service
provider during a vendor risk assessment?
Answer: B
Q.No.100 Periodically reviewing and updating a risk register with details on identified risk
factors PRIMARILY helps to:
Answer: D
Q.No.101 The BEST way to test the operational effectiveness of a data backup procedure is
to:
Answer: B
Q.No.102 Which of the following is MOST important to the effective monitoring of key risk
indicators (KRIS)?
Answer: A
Q.No.104 Which of the following is the GREATEST concern when using a generic set of IT
risk scenarios for risk analysis?
Answer: D
Q.No.105 A newly hired risk practitioner finds that the risk register has not been updated in
the past year. What is the risk practitioner's BEST course of action?
Answer: C
Q.No.106 Business areas within an organization have engaged various cloud service
providers directly without assistance from the IT department. What should the risk practitioner
do?
Answer: A
Q.No.107 Which of the following would present the GREATEST challenge when assigning
accountability for control ownership?
Answer: C
Answer: D
Answer: C
Q.No.110 Which of the following BEST indicates effective information security incident
management?
Answer: B
Q.No.111 The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
A. detect changes in the risk profile.
B. rectify errors in results of KRI s.
C. reduce costs of risk mitigation controls.
D. continually improve risk assessments.
Answer: A
Answer: A
Q.No.113 IT stakeholders have asked a risk practitioner for IT risk profile reports associated
with specific departments to allocate resources for risk mitigation. The BEST way to address
this request would be to use:
Answer: C
Q.no.114 Which type of cloud computing deployment provides the consumer the GREATEST
degree of control over the environment?
A. Community cloud
B. Private cloud
C. Hybrid cloud
D. Public doud
Answer: B
Answer: A
Q.No.116 Which of the following BEST indicates that an organization has implemented IT
performance requirements?
A. Accountability matrix
B. Benchmarking data
C. Service level agreements (SLA)
D. Vendor references
Answer: C
Q.No.117 Which of the following would be MOST useful to senior management when
determining an appropriate risk response?
Answer: A
Q.No.118 The PRIMARY reason for periodic penetration testing of Internet-facing applications
is to:
Answer: D
Q.No.119 Which of the following would BEST enable a risk practitioner to embed risk
management within the organization?
Answer: D
Q.No.120 Which of the following is a PRIMARY benefit of engaging the risk owner during the
risk assessment process?
Answer: C
Q.No.121 A risk assessment has identified increased losses associated with an IT risk
scenario. It is MOST important for the risk practitioner to:
Answer: A
Q.No.122 Which of the following BEST facilitates the development of effective IT risk
scenarios?
Answer: D
Answer: B
Q.No.124 Which stakeholders are PRIMARILY responsible for determining enterprise IT risk
appetite?
Answer: B
Q.No.125 The PRIMARY benefit associated with key risk indicators (KRIS) is that they:
Answer: D
Q.No.126 Which of the following is the MOST effective control to maintain the integrity of
system configuration files?
Answer: A
Q.No.127 Who should be responsible for implementing and maintaining security controls?
A. Internal auditor
B. Data custodian
C. End user
D. Data owner
Answer: D
Q.No.128 Which of the following would be a weakness in procedures for controlling the
migration of changes to production libraries?
Answer: C
A. Resource requirements
B. Risk tolerance level
C. Business context
D. Benchmarking information
Answer: C
Q.No.130 Which of the following BEST ensures that identified risk scenarios are addressed?
Answer: B
Answer: D
Q.No.133 Which of the following BEST measures the impact of business interruptions caused
by an IT service outage?
Answer: B
Answer: D
A. Device corruption
B. User support
C. Data loss
D. Malicious users
Answer: D
Q.No.136 Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
Answer: C
Q.No.137 Which of the following is the BEST way to ensure ongoing control effectiveness?
Answer: A
Q.No.138 What should a risk practitioner do FIRST when vulnerability assessment results
identify a weakness in an application?
Answer: C
Answer: A
Q.No.140 Which of the following is the MOST effective way to integrate business risk
management with IT operations?
A. Require a risk assessment with change requests.
B. Provide security awareness training.
C. Perform periodic IT control self-assessments (CSAS).
D. Perform periodic risk assessments.
Answer: D
Q.No.141 Which of the following is MOST helpful to management when determining the
resources needed to mitigate a risk?
A. A vulnerability report
B. An internal audit
C. A business impact analysis (BIA)
D. A heat map
Answer: C
Q.No.142 From a risk management perspective, which of the following is the PRIMARY
benefit of using automated system configuration validation tools?
Answer: B
Q.No.143 Which of the following is MOST important for a risk practitioner to verify when
evaluating the effectiveness of an organization's existing controls?
Answer: A
Q.No.144 Which of the following is the MOST important responsibility of a risk owner?
Answer: C
Answer: A
Q.No.146 A risk practitioner has become aware of production data being used in a test
environment. Which of the following should be the practitioner's PRIMARY concern?
Answer: A
Q.No.147 An organization striving to be on the leading edge in regard to risk monitoring would
MOST likely implement:
Answer: B
Q.No.148 The MOST essential content to include in an IT risk awareness program is how to:
Q.No.149 Within the three lines of defense model, the accountability for the system of internal
control resides with:
Answer: B
Answer: B