Skip to main content

This CRISC Exam Simulator took countless hours to be crafted. Each question was personally, and meticulously analyzed and verified.
Share, like, enjoy. Pass your exam with flying colours!

Scroll to Simulator!
0
‎ questions
with explanations
Mobile Friendly
CRISC Exam Simulator by Miroslaw Dabrowski
Icon featuring exam simulator large database of questions

1200+
questions

Icon featuring exam simulator scores by category functionality

Score per
category

Icon featuring exam simulator rationales to all questions

Answers
explanations(*)

Icon featuring exam simulator fullscreen, focus mode functionality

Fullscreen,
focus mode

Icon featuring exam simulator navigation and questions bookmarking functionality

Questions
flagging

Icon featuring exam simulator report question functionality

Issue
reporting

*I might start by adding questions first (as MVP), then work on explanations later. So, don’t worry, everything’s fine, Houston!

Icon toglle fullscreen mode EN

Report a question

You cannot submit an empty report. Please add some details.
0 votes, 0 avg
0
Created by Miroslaw Dabrowski

CRISC® Exam Simulator

multiple choice exam (ABCD)
one or multiple correct answers per question
# of questions: 150 | ~56% to pass
duration: 240 minutes
closed book exam

Exam questions database size: 1232
Copyright © Mirosław Dąbrowski

1 / 150

1. Which of the following phases is involved in the Data Extraction, Validation, Aggregation and Analysis?

2 / 150

2. Which of the following would be an IT business owner’s BEST course of action following an unexpected increase in emergency changes?

3 / 150

3. Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

4 / 150

4. Which of the following is the BEST method for discovering high-impact risk types?

5 / 150

5. Which of the following nodes of the decision tree analysis represents the start point of the decision tree?

6 / 150

6. You are the project manager for ACMECompany Inc. You are studying the documentation of the project plan. The documentation states that there are twenty-five stakeholders in the project. What will be the number of communication channels for the project?

7 / 150

7. An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?

8 / 150

8. Which among the following acts as a trigger for the risk response process?

9 / 150

9. Which of the following is a PRIMARY consideration when developing an IT risk awareness program?

10 / 150

10. The IT department wants to use a server for an enterprise database, but the server hardware is not certified by the operating system (OS) or the database vendor. A risk practitioner determines that the use of the database presents:

11 / 150

11. Which of the following risk assessment outputs is MOST suitable to help justify an organizational information security program?

12 / 150

12. Which of the following BEST determines compliance with the risk appetite of an enterprise?

13 / 150

13. Which of the following risk register updates is MOST important for senior management to review?

14 / 150

14. A lack of adequate controls represents:

15 / 150

15. What is the value of the exposure factor if the asset is lost completely?

16 / 150

16. During a risk assessment of a start-up company with a bring-your-own-device (BYOD) practice, a risk practitioner notes that the database administrator (DBA) minimizes a social media website on his/her device before running a query of credit card account numbers on a third-party cloud application. The risk practitioner should recommend that the enterprise:

17 / 150

17. You are the project manager of the ABC project for your company. You are working with your project team to complete a risk audit. A recent issue that your project team responded to, and management approved, was to increase the project schedule because there was risk surrounding the installation time of a new material. Your logic was that with the expanded schedule there would be time to complete the installation without affecting downstream project activities. What type of risk response is being audited in this scenario?

18 / 150

18. Calculation of the recovery time objective (RTO) is necessary to determine the:

19 / 150

19. Investments in risk management technologies should be based on:

20 / 150

20. You are the risk official at ACMECompany Inc. You are asked to perform a risk assessment of the impact of losing a server. For this assessment, you need to calculate the monetary value of the server. On which of the following bases do you calculate monetary value?

21 / 150

21. Which of the following is MOST important when mitigating or managing risk?

22 / 150

22. Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?

23 / 150

23. An organization is making significant changes to an application. At what point should the application risk profile be updated?

24 / 150

24. Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?

25 / 150

25. To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:

26 / 150

26. Which of the following would be MOST useful when measuring the progress of a risk response action plan?

27 / 150

27. A teaming agreement is an example of what type of risk response?

28 / 150

28. Which of the following is the MOST important input when developing risk scenarios?

29 / 150

29. Which of the following is the PRIMARY reason that a risk practitioner determines the security boundary prior to conducting a risk assessment?

30 / 150

30. A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization's enterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?

31 / 150

31. Which of the following is the GREATEST concern associated with redundant data in an organization’s inventory system?

32 / 150

32. The PRIMARY reason for communicating risk assessment results to data owners is to enable the:

33 / 150

33. Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?

34 / 150

34. You are the project manager of the ABC project for your company. You need to complete a project management process that will be on the lookout for new risks, changing risks, and risks that are now outdated. Which project management process is responsible for these actions?

35 / 150

35. Which of the following practices is MOST closely associated with risk monitoring?

36 / 150

36. What is the MAIN purpose of designing risk management programs?

37 / 150

37. The MOST effective way to increase the likelihood that risk responses will be implemented is to:

38 / 150

38. An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?

39 / 150

39. What components constitute SWOT Analysis? Choose ALL OPTIONS THAT APPLY, each representing a complete solution.

40 / 150

40. Which of the following should be of MOST concern to a risk practitioner?

41 / 150

41. You are preparing to complete the quantitative risk analysis process with your project team and several subject matter experts. You gather the necessary inputs including the project's cost management plan. Why is it necessary to include the project's cost management plan in the preparation for the quantitative risk analysis process?

42 / 150

42. Which of the following will BEST mitigate the risk associated with IT and business misalignment?

43 / 150

43. Controls should be defined during the design phase of system development because:

44 / 150

44. Out of several risk responses, which of the following risk responses is used for negative risk events?

45 / 150

45. Which of the following terms does qualitative risk assessment employ to assess risk levels? Choose TWO OPTIONS THAT APPLY, each representing a part of the solution.

46 / 150

46. A risk response report includes recommendations for:

47 / 150

47. From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

48 / 150

48. A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?

49 / 150

49. Which of the following BEST indicates that an organizations risk management program is effective?

50 / 150

50. Which of the following BEST facilitates the development of effective IT risk scenarios?

51 / 150

51. Which of the following decision tree nodes have probability attached to their branches?

52 / 150

52. Security administration efforts are BEST reduced through the deployment of:

53 / 150

53. Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?

54 / 150

54. Which of the following is the way to verify control effectiveness?

55 / 150

55. You work as a project manager for ACMECompany Inc. Management has asked you to work with the key project stakeholders to analyze the risk events you have identified in the project. They would like you to analyze the project risks to improve the project's performance as a whole. What approach can you use to achieve this goal of improving the project's performance through risk analysis with your project stakeholders?

56 / 150

56. Tom works as a project manager for BlueWell Inc. He is determining which risks can affect the project. Which of the following inputs of the identify risks process is useful in identifying risks, and provides a quantitative assessment of the likely cost to complete the scheduled activities?

57 / 150

57. Risks to an organization's image are referred to as what kind of risk?

58 / 150

58. Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?

59 / 150

59. Which of the following statements accurately describes threats? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

60 / 150

60. A key objective when monitoring information systems control effectiveness against the enterprise’s external requirements is to:

61 / 150

61. Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

62 / 150

62. Which of the following is the GREATEST concern associated with redundant data in an organization's inventory system?

63 / 150

63. An enterprise’s corporate policy specifies that only failed and successful access attempts are logged. What is the PRIMARY risk to the enterprise?

64 / 150

64. Which of the following BEST enables detection of ethical violations committed by employees?

65 / 150

65. Which of the following is the BEST way to assess the effectiveness of an access management process?

66 / 150

66. Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

67 / 150

67. Which of the following is the GREATEST challenge of performing a quantitative risk analysis?

68 / 150

68. Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

69 / 150

69. You are the project manager of your enterprise. You have identified several risks. Which of the following responses to risk is considered the MOST appropriate?

70 / 150

70. Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

71 / 150

71. After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?

72 / 150

72. An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:

73 / 150

73. Which of the following is the BEST option to ensure that corrective actions are taken after a risk assessment is performed?

74 / 150

74. The risk appetite for an organization could be derived from which of the following?

75 / 150

75. An organization's control environment is MOST effective when:

76 / 150

76. Stephen is the project manager of the ABC project. He has worked with two subject matter experts and his project team to complete the risk assessment technique. There are approximately 47 risks that have a low probability and a low impact on the project. Which answers BEST describe what Stephen should do with these risk events?

77 / 150

77. A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?

78 / 150

78. When configuring a biometric access control system that protects a high-security data center, the system’s sensitivity level should be set to:

79 / 150

79. Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?

80 / 150

80. The board of directors of a one-year-old start-up company has asked their Chief Information Oofficer (CIO) to create all of the enterprise's IT policies and procedures, which will be managed and approved by the IT steering committee. The IT steering committee will make all of the IT decisions for the enterprise, including those related to the technology budget. Which type of IT organizational structure does the enterprise have?

81 / 150

81. Which of the following should be of MOST concern to a risk practitioner reviewing findings from a recent audit of an organization’s data center?

82 / 150

82. Which of the following operational risks ensures that the provision of a quality product is NOT overshadowed by the production costs of that product?

83 / 150

83. Which of the following should be PRIMARILY considered while designing information systems controls?

84 / 150

84. Which of the following criteria is MOST important when developing a response to an attack that would compromise data?

85 / 150

85. Which of the following can be used to assign a monetary value to risk?

86 / 150

86. An enterprise is hiring a consultant to help determine the maturity level of the risk management program. The MOST important element of the request for proposal (RFP) is the:

87 / 150

87. You are the risk official at ACMECompany Inc. You are supposed to prioritize several risks. A risk has a rating for occurrence, severity, and detection as 4, 5, and 6, respectively. What Risk Priority Number (RPN) you would give to it?

88 / 150

88. During qualitative risk analysis, you want to define the risk urgency assessment. All of the following are indicators of risk priority except for which one?

89 / 150

89. Which of the following BEST enables a peer review of an enterprise’s risk management process?

90 / 150

90. You work as a project manager for ACMECompany Inc. Your project is using a new material to construct a large warehouse in your city. This new material is cheaper than traditional building materials, but it takes some time to learn how to use the material properly. You have communicated to the project stakeholders that you will be able to save costs by using the new material, but you will need a few extra weeks to complete training to use the materials. This risk response of learning how to use the new materials can also be known as what term?

91 / 150

91. Which of the following is the MOST important reason to maintain key risk indicators (KRIs)?

92 / 150

92. The BEST method for detecting and monitoring a hacker's activities without exposing information assets to unnecessary risk is to utilize:

93 / 150

93. Because of its importance to the business, an enterprise wants to quickly implement a technical solution that deviates from the company's policies. The risk practitioner should:

94 / 150

94. In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

95 / 150

95. The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:

96 / 150

96. Which of the following controls focuses on operational efficiency in a functional area sticking to management policies?

97 / 150

97. An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner's BEST recommendation?

98 / 150

98. After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?

99 / 150

99. The GREATEST concern when maintaining a risk register is that:

100 / 150

100. What are the steps that are involved in articulating risks? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

101 / 150

101. Which of the following is true for risk evaluation?

102 / 150

102. Which of the following is MOST important for successful incident response?

103 / 150

103. You're employed as a Project Manager at ACMECompany Inc. You and your team members are currently engaged in the risk identification process. Which of the following tools and techniques will you utilize during the identify-risk process? Choose ALL OPTIONS THAT APPLY, each representing a complete solution.

104 / 150

104. What security plans should the organization implement? Choose ALL OPTIONS THAT APPLY, each representing a complete solution.

105 / 150

105. An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?

106 / 150

106. You are the project manager for the ABC project. You need to perform the Qualitative risk analysis process. When you have completed this process, you will produce all of the following as part of the risk register update output except which one?

107 / 150

107. Which of the following potential scenarios associated with the implementation of a new database technology presents the GREATEST risk to an organization?

108 / 150

108. Security technologies should be selected PRIMARILY on the basis of their:

109 / 150

109. You are the project manager of the ABC project. You are performing cost and benefit analysis of control. You come across the result that the costs of specific controls exceed the benefits of mitigating a given risk. What is the BEST action would you choose in this scenario?

110 / 150

110. What are the PRIMARY risk components that must be communicated among all the stakeholders? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

111 / 150

111. It is MOST important for a risk evaluation to:

112 / 150

112. You are the project manager of the ABC project. Your project involves the use of an electrical motor. It was stated in its specification that if its temperature increased to 500 degrees Fahrenheit the machine would overheat and have to be shut down for 48 hours. If the machine overheats even once it will delay the project's arrival date. So to prevent this you have decided while creating a response that if the temperature of the machine reaches 450, the machine will be paused for at least an hour to normalize its temperature. This temperature of 450 degrees is referred to as?

113 / 150

113. If one says that the particular control or monitoring tool is sustainable, then it refers to what ability?

114 / 150

114. What are the fundamental principles of access controls among the following options? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

115 / 150

115. The PRIMARY focus of managing IT-related business risk is to protect:

116 / 150

116. As part of risk monitoring, the administrator of a two-factor authentication system identifies a trusted ind ependent source indicating that the algorithm used for generating keys has been compromised. The vendor of the authentication system has not provided further information. Which of the following is the BEST initial course of action?

117 / 150

117. You and your project team have identified a few risk events in the project and recorded the events in the risk register. Part of the recording of the events includes the identification of a risk owner. Who is a risk owner?

118 / 150

118. When is the BEST to identify risk associated with major project to determine a mitigation plan?

119 / 150

119. What are the two MAJOR considerations when determining the level of risk appetite? Choose TWO OPTIONS THAT APPLY, each representing a part of the solution.

120 / 150

120. Which of the following processes addresses the risks by their priorities, schedules the project management plan as required, and inserts resources and activities into the budget?

121 / 150

121. When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?

122 / 150

122. You work as the project manager for ACMECompany Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

123 / 150

123. In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?

124 / 150

124. A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:

125 / 150

125. You work as the project manager for Company Inc. The project on which you are working has several risks that will affect several stakeholder requirements.Which project management plan will define who will be available to share information on the project risks?

126 / 150

126. The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?