Crisc Part2
Crisc Part2
QUESTION 955
An organization has completed a risk assessment of one of its service providers. Who should be accountable
for ensuring that risk responses are implemented?
A. IT risk practitioner
B. The relationship owner
C. Third-party security team
D. Legal representation of the business
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 956
A risk practitioner identifies a database application that has been developed and implemented by the business
independently of IT. Which of the following is the BEST course of action?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 957
Which of the following would be a risk practitioner's BEST course of action when a project team has accepted
a risk outside the established risk appetite?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 958
Who should be responsible for evaluating the residual risk after a compensating control has been applied?
A. Risk practitioner
B. Compliance manager
C. Risk owner
D. Control owner
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 375
CRISC Exam
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 959
Which of the following should a risk practitioner validate FIRST when a mitigating control cannot be
implemented fully to support business objectives?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 960
Which of the following is the BEST way to determine whether system settings are in alignment with control
baselines?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 961
A maturity model is MOST useful to an organization when it:
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 962
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 376
CRISC Exam
It was determined that replication of a critical database used by two business units failed. Which of the
following should be of GREATEST concern?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 963
Which of the following is the BEST control to mitigate the risk when a critical customer-facing application has
been susceptible to recent credential stuffing attacks?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 964
Which of the following is MOST important to the effective monitoring of key risk indicators (KRIs)?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 965
A multinational organization is considering implementing standard background checks for all new employees.
A KEY concern regarding this approach is that it may:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 377
CRISC Exam
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 966
A core data center went offline abruptly for several hours, affecting many transactions across multiple
locations. Which of the following would provide the MOST useful information to determine mitigating controls?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 967
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have
exceeded the maximum time defined by the business application owners. Which of the following is MOST
likely to change as a result?
A. Risk tolerance
B. Risk likelihood
C. Risk appetite
D. Risk forecasting
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 968
A project team recommends accepting the residual risk associated with known regulatory control deficiencies.
Which of the following is the risk practitioner's MOST important recommendation to the project manager?
A. Present the remaining deficiencies to the project steering committee for sign-off.
B. Assess the risk of the remaining deficiencies and develop an action plan.
C. Update the project risk register with the remaining deficiencies and remediation actions.
D. Confirm a timeline to remediate the remaining deficiencies after the project goes live.
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 378
CRISC Exam
QUESTION 969
The BEST key performance indicator (KPI) to measure the effectiveness of the security-patching process is
the percentage of patches installed:
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 970
Which of the following is the BEST recommendation of a risk practitioner for an organization that recently
changed its organizational structure?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 971
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning
process is to:
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 972
A financial institution has identified high risk of fraud in several business applications. Which of the following
controls will BEST help reduce the risk of fraudulent internal transactions?
A. Segregation of duties
B. Periodic internal audits
C. Log monitoring
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 379
CRISC Exam
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 973
A new regulatory requirement imposes severe fines for data leakage involving customers' personally
identifiable information (PII). The risk practitioner has recommended avoiding the risk. Which of the following
actions would BEST align with this recommendation?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 974
As part of business continuity planning, which of the following is MOST important to include in a business
impact analysis (BIA)?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 975
When documenting a risk response, which of the following provides the STRONGEST evidence to support the
decision?
Correct Answer: C
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 380
CRISC Exam
Explanation/Reference:
QUESTION 976
Which of the following is the MOST important activity when identifying relevant risk data?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 977
An organization has made a decision to purchase a new IT system. During which phase of the system
development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
A. Acquisition
B. Implementation
C. Initiation
D. Operation and maintenance
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 978
From a risk management perspective, which of the following is the PRIMARY benefit of using automated
system configuration validation tools?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 979
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 381
CRISC Exam
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 980
Who should be responsible for strategic decisions on risk management?
A. Audit committee
B. Executive management team
C. Chief information officer (CIO)
D. Business process owner
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 981
Which of the following would be the GREATEST concern for an IT risk practitioner when an employee has
transferred to another department?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 982
An organization is planning to implement a guest wireless network granting internet access only. Which of the
following is the MOST important consideration to effectively mitigate the risk of guests gaining access to the
organization's internal network?
Correct Answer: B
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 382
CRISC Exam
Explanation/Reference:
QUESTION 983
Which of the following should be determined FIRST when a new security vulnerability is made public?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 984
When should be a risk practitioner’s PRIMARY focus when evaluating a proposed robotic process automation
of a business service?
A. License availability
B. Cost-benefit analysis
C. Code review
D. Control capability
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 985
Which of the following stakeholders are typically included as part of a line of defense within the three lines of
defense model?
A. Regulators
B. Legal team
C. Vendors
D. Board of directors
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 986
Which of the following is the MOST important data attribute of key risk indicators (KRIs)?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 383
CRISC Exam
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 987
What should a risk practitioner do FIRST when a shadow IT application is identified in a business owner's
business impact analysis (BIA)?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 988
An organization is planning to move its application infrastructure from on-premise to the cloud. Which of the
following is the BEST course of action to address the risk associated with data transfer if the relationship is
terminated with the vendor?
A. Work closely with the information security officer to ensure the company has the proper security controls in
place.
B. Collect requirements for the environment to ensure the Infrastructure as a Service (IaaS) is configured
appropriately.
C. Meet with the business leaders to ensure the classification of their transferred data is in place.
D. Ensure the language in the contract explicitly states who is accountable for each step of the data transfer
process.
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 989
Which of the following would BEST mitigate an identified risk scenario?
Correct Answer: A
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 384
CRISC Exam
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 990
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control
ownership?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 991
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 992
A risk practitioner has been asked to recommend a key performance indicator (KPI) to assess the
effectiveness of a manual process to terminate user access. Which of the following would be the BEST KPI to
recommend?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 993
Which of the following would BEST help to address the risk associated with malicious outsiders modifying
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 385
CRISC Exam
application data?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 994
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should
be of MOST concern?
A. The chief information security officer (CISO) has not approved the plan.
B. Several recovery activities will be outsourced.
C. Some critical business applications are not included in the plan.
D. The plan is not based on an internationally recognized framework.
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 995
A key risk indicator (KRI) flags an exception for exceeding a threshold but remains within risk appetite. Which
of the following should be done NEXT?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 996
An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
Correct Answer: B
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 386
CRISC Exam
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 997
An organization is concerned that its employees may be unintentionally disclosing data through the use of
social media sites. Which of the following will MOST effectively mitigate this risk?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 998
Which of the following contributes MOST to the effective implementation of risk responses?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 999
Which of the following BEST indicates the risk appetite and tolerance level for the risk associated with
business interruption caused by IT system failures?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1000
Which of the following is the MOST important consideration when developing risk strategies?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 387
CRISC Exam
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1001
Which of the following would BEST facilitate the implementation of data classification requirements?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1002
An organization has used generic risk scenarios to populate its risk register. Which of the following presents
the GREATEST challenge to assigning ownership of the associated risk entries?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1003
An organization's business process requires the verbal verification of personal information in an environment
where other customers may overhear this information. Which of the following is the MOST significant risk?
Correct Answer: B
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 388
CRISC Exam
Explanation/Reference:
QUESTION 1004
An organization has initiated a project to launch an IT-based service to customers and take advantage of being
the first to market. Which of the following should be of GREATEST concern to senior management?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1005
Which of the following is the MOST important objective of embedding risk management practices into the
initiation phase of the project management life cycle?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1006
Which of the following is the MOST significant indicator of the need to perform a penetration test?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1007
Which of the following provides the MOST reliable information to ensure a newly acquired company has
appropriate IT controls in place?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 389
CRISC Exam
A. Vulnerability assessment
B. Information system audit
C. Penetration testing
D. IT risk assessment
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1008
Print jobs containing confidential information are sent to a shared network printer located in a secure room.
Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1009
Which of the following would be MOST helpful when communicating roles associated with the IT risk
management process?
A. Skills matrix
B. RACI chart
C. Organizational chart
D. Job descriptions
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1010
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up
approach is the ability to:
Correct Answer: A
Section: Volume D
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 390
CRISC Exam
Explanation
Explanation/Reference:
QUESTION 1011
A bank recently incorporated blockchain technology with the potential to impact known risk within the
organization. Which of the following is the risk practitioner’s BEST course of action?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1012
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
A. Control owner
B. Internal auditor
C. Asset owner
D. Finance manager
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1013
The risk associated with an asset after controls are applied can be expressed as:
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1014
A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would
BEST assist in making a recommendation to management?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 391
CRISC Exam
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1015
Which key performance indicator (KPI) BEST measures the effectiveness of an organization's disaster
recovery program?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1016
The PRIMARY advantage of involving end users in continuity planning is that they:
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1017
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
Correct Answer: B
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 392
CRISC Exam
Explanation/Reference:
QUESTION 1018
Which of the following is the BEST way to ensure ongoing control effectiveness?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1019
Who should have the authority to approve an exception to a control?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1020
Which of the following is a responsibility of the second line of defense in the three lines of defense model?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1021
To mitigate the risk of using a spreadsheet lo analyze financial data. IT has engaged a third-party vendor to
deploy a standard application to automate the process. Which of the following parties should own the risk
associated with calculation errors?
A. Third-party provider
B. Business owner
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 393
CRISC Exam
C. IT department
D. Risk manager
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1022
Which of the following provides the BEST evidence that risk responses are effective?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1023
A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide.
Which of the following should be done FIRST?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1024
Which of the following is the MAIN purpose of monitoring risk?
A. Benchmarking
B. Risk analysis
C. Decision support
D. Communication
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 394
CRISC Exam
QUESTION 1025
What is the PRIMARY benefit of risk monitoring?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1026
An organization's control environment is MOST effective when:
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1027
When reviewing the business continuity plan (BCP) of an online sales order system, a risk practitioner notices
that the recovery time objective (RTO) has a shorter time than what is defined in the disaster recovery plan
(DRP). Which of the following is the BEST way for the risk practitioner to address this concern?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1028
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of
Things (IoT) devices to collect and process personally identifiable information (PII)?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 395
CRISC Exam
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1029
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and
approve transactions of significant value. This team is also responsible for ensuring transactions are recorded
and balances are reconciled by the end of the day. Which of the following is the risk practitioner’s BEST
recommendation to mitigate the associated risk?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1030
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the
following is the MOST important reason the risk should remain in the risk register?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1031
Reviewing which of the following provides the BEST indication of an organization's risk tolerance?
Correct Answer: B
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 396
CRISC Exam
Explanation/Reference:
QUESTION 1032
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient
network bandwidth?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1033
When developing a risk awareness training program, which of the following training topics would BEST
facilitate a thorough understanding of risk scenarios?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1034
Which of the following would provide the MOST objective assessment of the effectiveness of an organization's
security controls?
A. A third-party audit
B. Internal penetration testing
C. Security operations center review
D. An internal audit
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1035
Which of the following is the MOST important information to be communicated during security awareness
training?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 397
CRISC Exam
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1036
Which of the following is the GREATEST critical success factor (CSF) of an IT risk management program?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1037
Which of the following should be the risk practitioner's FIRST course of action when an organization has
decided to expand into new product areas?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1038
Which of the following BEST supports the management of identified risk scenarios?
Correct Answer: A
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 398
CRISC Exam
Explanation/Reference:
QUESTION 1039
A risk practitioner observed that a high number of policy exceptions were approved by senior management.
Which of the following is the risk practitioner's BEST course of action to determine root cause?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1040
An organization has decided to use an external auditor to review the control environment of an outsourced
service provider. The BEST control criteria to evaluate the provider would be based on:
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1041
A global company's business continuity plan (BCP) requires the transfer of its customer information systems to
an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST
important risk consideration?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1042
Which of the following will MOST effectively align IT controls with corporate risk tolerance?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 399
CRISC Exam
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1043
Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to
remotely connect to the organization's IT systems via personal or public computers?
A. Risk tolerance
B. Risk appetite
C. Inherent risk
D. Key risk indicator (KRI)
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1044
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster
recovery test of critical business processes?
A. Percentage of processes recovered within the recovery time and point objectives
B. Number of current test plans and procedures
C. Percentage of job failures identified and resolved during the recovery process
D. Number of issues and action items resolved during the recovery test
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1045
When developing risk scenarios using a list of generic scenarios based on industry best practices, it is MOST
important to:
Correct Answer: B
Section: Volume D
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 400
CRISC Exam
Explanation
Explanation/Reference:
QUESTION 1046
The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it
enables:
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1047
Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes
to IT services?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1048
Which of the following should be the FIRST step to investigate an IT monitoring system that has a decreasing
alert rate?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1049
When formulating a social media policy to address information leakage, which of the following is the MOST
important concern to address?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 401
CRISC Exam
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1050
Which of the following should be the risk practitioner's FIRST course of action when an organization plans to
adopt a cloud computing strategy?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1051
Which element of an organization's risk register is MOST important to update following the commissioning of a
new financial reporting system?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1052
Which of the following is the BEST way to address a board's concern about the organization's cybersecurity
posture?
Correct Answer: D
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 402
CRISC Exam
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1053
Which of the following is MOST influential when management makes risk response decisions?
A. Detection risk
B. Risk appetite
C. Audit risk
D. Residual risk
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1054
Which of the following would MOST likely drive the need to review and update key performance indicators
(KPIs) for critical IT assets?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1055
Which of the following is the MOST important component of effective security incident response?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1056
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST
mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 403
CRISC Exam
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1057
When is the BEST time to identify risk associated with major projects to determine a mitigation plan?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1058
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to
secure multiple systems with limited IT resources?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1059
Which of the following is MOST important to include in a risk assessment of an emerging technology?
A. Key controls
B. Risk and control ownership
C. Risk response plans
D. Impact and likelihood ratings
Correct Answer: D
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 404
CRISC Exam
Explanation/Reference:
QUESTION 1060
Which of the following would MOST electively reduce risk associated with an increased volume of online
transactions on a retailer website?
A. Transaction limits
B. Scalable infrastructure
C. A hot backup site
D. Website activity monitoring
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1061
Which of the following is MOST important to consider when determining the value of an asset during the risk
identification process?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1062
Risk acceptance of an exception to a security control would MOST likely be justified when:
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1063
Which of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk
register maintenance?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 405
CRISC Exam
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1064
It is MOST important that security controls for a new system be documented in:
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1065
Which of the following is MOST important to review when determining whether a potential IT service provider’s
control environment is effective?
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1066
Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function
within an organization experiencing high employee turnover?
Correct Answer: B
Section: Volume D
Explanation
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 406
CRISC Exam
Explanation/Reference:
QUESTION 1067
The PRIMARY purpose of using a framework for risk analysis is to:
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1068
Within the three lines of defense model, the accountability for the system of internal controls resides with:
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1069
Before assigning sensitivity levels to information, it is MOST important to:
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1070
Which of the following risk-related information is MOST valuable to senior management when formulating an
IT strategic plan?
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 407
CRISC Exam
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1071
What information related to a system vulnerability would be MOST useful to management in making an
effective risk-based decision?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1072
Which of the following is MOST helpful to understand the consequences of an IT risk event?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1073
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 408
CRISC Exam
QUESTION 1074
Which of the following is MOST important for an organization to update following a change in legislation
requiring notification to individuals impacted by data breaches?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1075
Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled
fraud?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1076
Which of the following is the BEST way to quantify the likelihood of risk materialization?
A. Balanced scorecard
B. Business impact analysis (BIA)
C. Threat and vulnerability assessment
D. Compliance assessments
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1077
In order to determine if a risk is under-controlled, the risk practitioner will need to:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 409
CRISC Exam
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1078
A third-party vendor has offered to perform user access provisioning and termination. Which of the following
control accountabilities is BEST retained within the organization?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1079
The PRIMARY reason for prioritizing risk scenarios is to:
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1080
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform
based on the value added by the platform and the organization's risk appetite. Which of the following is the risk
practitioner’s BEST course of action?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1081
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 410
CRISC Exam
A company has recently acquired a customer relationship management (CRM) application from a certified
software vendor. Which of the following will BEST help to prevent technical vulnerabilities from being
exploited?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1082
Which of the following MOST effectively limits the impact of a ransomware attack?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1083
A risk practitioner is presenting the risk profile to management, indicating an increase in the number of
successful network attacks. This information would be MOST helpful to:
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1084
Which of the following BEST helps to identify significant events that could impact an organization?
A. Vulnerability analysis
B. Scenario analysis
C. Heat map analysis
D. Control analysis
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 411
CRISC Exam
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1085
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of
the following should be the risk practitioner's NEXT step?
Correct Answer: C
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1086
Which of the following would present the MOST significant risk to an organization when updating the incident
response plan?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1087
An organization has provided legal text explaining the rights and expected behavior of users accessing a
system from geographic locations that have strong privacy regulations. Which of the following control types
has been applied?
A. Detective
B. Preventive
C. Compensating
D. Directive
Correct Answer: D
Section: Volume D
Explanation
Explanation/Reference:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 412
CRISC Exam
QUESTION 1088
An organization will be impacted by a new data privacy regulation due to the location of its production facilities.
What action should the risk practitioner take when evaluating the new regulation?
Correct Answer: A
Section: Volume D
Explanation
Explanation/Reference:
QUESTION 1089
Which of the following is MOST helpful in preventing risk events from materializing?
Correct Answer: B
Section: Volume D
Explanation
Explanation/Reference:
07B13F58239056B81577933EB624485B
“Best Material, Great Results”. www.certkingdom.com 413