Skip to main content

This Exam Simulator took countless hours to be crafted. Each question was personally, and meticulously analyzed and verified.
Share, like, enjoy. Pass your exam with flying colours!

Scroll to Simulator!
0
‎ questions
with explanations
Mobile Friendly

1200+
questions

Score per
category

Answers
explanations(*)

Fullscreen,
focus mode

Questions
flagging

Issue
reporting

*I might start by adding questions first (as MVP), then work on explanations later. So, don’t worry, everything’s fine, Houston!

Report a question

You cannot submit an empty report. Please add some details.
0 votes, 0 avg
0
Created by Miroslaw Dabrowski

CRISC® Exam Simulator

multiple choice exam (ABCD)
one or multiple correct answers per question
# of questions: 150 | ~56% to pass
duration: 240 minutes
closed book exam

Exam questions database size: 1232
Copyright © Mirosław Dąbrowski

1 / 150

1. When is the BEST to identify risk associated with major project to determine a mitigation plan?

2 / 150

2. Which of the following would MOST likely require a risk practitioner to update the risk register?

3 / 150

3. As part of an enterprise risk management (ERM) program, a risk practitioner BEST leverages the work performed by an internal audit function by having it:

4 / 150

4. Stephen is the project manager of the ABC project. He has worked with two subject matter experts and his project team to complete the risk assessment technique. There are approximately 47 risks that have a low probability and a low impact on the project. Which answers BEST describe what Stephen should do with these risk events?

5 / 150

5. An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?

6 / 150

6. Which of the following statements is true for risk analysis?

7 / 150

7. After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?

8 / 150

8. Which of the following is the priority of data owners when establishing risk mitigation method?

9 / 150

9. Previously accepted risk should be:

10 / 150

10. Which of the following provides the BEST measurement of an organization’s risk management maturity level?

11 / 150

11. The IT department wants to use a server for an enterprise database, but the server hardware is not certified by the operating system (OS) or the database vendor. A risk practitioner determines that the use of the database presents:

12 / 150

12. Which of the following is the BEST control to detect an advanced persistent threat (APT)?

13 / 150

13. The BEST way to test the operational effectiveness of a data backup procedure is to:

14 / 150

14. Which of the following is the BEST reason for performing risk assessment?

15 / 150

15. An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?

16 / 150

16. Which of the following would be MOST useful to senior management when determining an appropriate risk response?

17 / 150

17. Which of the following one can produce comprehensive results while performing qualitative risk analysis?

18 / 150

18. Which of the following is the BEST method to analyze risk, incidents and related interdependencies to determine the impact on organizational goals?

19 / 150

19. Suppose you are working in ACMECompany Inc. which sells various products through its website. Due to some recent losses, you are trying to identify the most important risks to the Website. Based on feedback from several experts, you have come up with a list. You now want to prioritize these risks. Now in which category you would put the risk concerning the modification of the Website by unauthorized parties?

20 / 150

20. Your company is covered under a liability insurance policy, which provides various liability coverage for information security risks, including any physical damage of assets, hacking attacks, etc. Which of the following risk management techniques is your company using?

21 / 150

21. Fred is the project manager of the ABC project. He is working with his project team to complete the quantitative risk analysis process as a part of risk management planning. Fred understands that once the quantitative risk analysis process is complete, the process will need to be completed again in at least two other times in the project. When will the quantitative risk analysis process need to be repeated?

22 / 150

22. What components constitute SWOT Analysis? Choose ALL OPTIONS THAT APPLY, each representing a complete solution.

23 / 150

23. Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?

24 / 150

24. Which of the following would BEST prevent an unscheduled application of a patch?

25 / 150

25. What is the MOST effective method to evaluate the potential impact of legal, regulatory and contractual requirements on business objectives?

26 / 150

26. Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?

27 / 150

27. You are the project manager of your enterprise. You have identified new threats and then evaluated the ability of existing controls to mitigate risk associated with new threats. You noticed that the existing control is not efficient in mitigating these new risks. What are the various steps you could take in this case? Choose ALL OPTIONS THAT APPLY, each representing a complete solution.

28 / 150

28. Which of the following BEST ensures that appropriate mitigation occurs on identified information systems vulnerabilities?

29 / 150

29. Which negative risk response usually has a contractual agreement?

30 / 150

30. Which of the following is the BEST risk management approach for the strategic IT planning process?

31 / 150

31. A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:

32 / 150

32. When proposing the implementation of a specific risk mitigation activity, a risk practitioner PRIMARILY utilizes a:

33 / 150

33. You are the project manager of the ABC project for your company. You are working with the project team to reassess existing risk events and to identify risk events that have not happened and whose relevancy to the project has passed. What should you do with these events that have not happened and would not happen now in the project?

34 / 150

34. Out of several risk responses, which of the following risk responses is used for negative risk events?

35 / 150

35. Thomas is a key stakeholder in your project. Thomas has requested several changes to the project scope for the project you are managing. Upon review of the proposed changes, you have discovered that these new requirements are laden with risks and you recommend to the change control board that the changes be excluded from the project scope. The change control board agrees with you. What component of the change control system communicates the approval or denial of a proposed change request?

36 / 150

36. You are the project manager of a large construction project. Part of the project involves the wiring of the electricity in the building your project is creating. You and the project team determine the electrical work is too dangerous to perform yourself so you hire an electrician to perform the work for the project. This is an example of what type of risk response?

37 / 150

37. Which of the following measures is MOST effective against insider threats to confidential information?

38 / 150

38. Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?

39 / 150

39. Which of the following BEST identifies controls addressing risk related to cloud computing?

40 / 150

40. Which of the following is the priority of data owners when establishing a risk mitigation method?

41 / 150

41. You are the project manager of your enterprise. You have introduced an intrusion detection system for the control. You have identified a warning of violation of the security policies of your enterprise. What type of control is an intrusion detection system (IDS)?

42 / 150

42. The BEST criteria when selecting a risk response is the:

43 / 150

43. Which of the following is the BEST approach when conducting an IT risk awareness campaign?

44 / 150

44. A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

45 / 150

45. Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?

46 / 150

46. Which of the following is the BEST indicator of the effectiveness of a control action plan’s implementation?

47 / 150

47. Which of the following is the BEST option to ensure that corrective actions are taken after a risk assessment is performed?

48 / 150

48. You are the project manager of a large project that will last four years. In this project, you would like to model the risk based on its distribution, impact, and other factors. There are three modeling techniques that a project manager can use to include both event-oriented and project-oriented analysis. Which modeling technique does NOT provide event-oriented and project-oriented analysis for identified risks?

49 / 150

49. Which of the following provides the BEST view of risk management?

50 / 150

50. You are preparing to complete the quantitative risk analysis process with your project team and several subject matter experts. You gather the necessary inputs including the project's cost management plan. Why is it necessary to include the project's cost management plan in the preparation for the quantitative risk analysis process?

51 / 150

51. Which of the following BEST identifies changes in an enterprise’s risk profile?

52 / 150

52. Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

53 / 150

53. You are the project manager of the ABC project for your company. You are working with your project team to complete a risk audit. A recent issue that your project team responded to, and management approved, was to increase the project schedule because there was risk surrounding the installation time of a new material. Your logic was that with the expanded schedule there would be time to complete the installation without affecting downstream project activities. What type of risk response is being audited in this scenario?

54 / 150

54. During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?

55 / 150

55. Which of the following is BEST performed for business continuity management to meet external stakeholder expectations?

56 / 150

56. Which of the following is the greatest risk to reporting?

57 / 150

57. Which of the following is the MOST appropriate method to evaluate the potential impact of legal, regulatory, and contractual requirements on business objectives?

58 / 150

58. An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:

59 / 150

59. John is the project manager of the ABC project for his company. His project has 75 stakeholders, some of which are external to the organization. John needs to make certain that he communicates about risk in the most appropriate method for the external stakeholders. Which project management plan will be the BEST guide for John to communicate to the external stakeholders?

60 / 150

60. The PRIMARY goal of a postincident review is to:

61 / 150

61. Which of the following presents the GREATEST privacy risk related to personal data processing for a global organization?

62 / 150

62. The FIRST step in identifying and assessing IT risk is to:

63 / 150

63. Which of the following components ensures that risks are examined for all new proposed change requests in the change control system?

64 / 150

64. A risk practitioner has become aware of a potential merger with another enterprise. What action should the risk practitioner take?

65 / 150

65. Which one of the following is the only output for the qualitative risk analysis process?

66 / 150

66. Which of the following is the MOST accurate definition of project risk?

67 / 150

67. The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:

68 / 150

68. Which of the following is the BEST reason an enterprise would decide not to reduce an identified risk?

69 / 150

69. Which of the following is MOST useful in managing increasingly complex deployments?

70 / 150

70. In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?

71 / 150

71. Which of the following is true about IT risk?

72 / 150

72. Which of the following is MOST critical when system configuration files for a critical enterprise application system are being reviewed?

73 / 150

73. A trusted third-party service provider has determined that the risk of a client's systems being hacked is low. Which of the following would be the client's BEST course of action?

74 / 150

74. When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?

75 / 150

75. Which of the following vulnerability assessment software can check for weak passwords on the network?

76 / 150

76. An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

77 / 150

77. Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:

78 / 150

78. An enterprise has outsourced personnel data processing to a supplier, and a regulatory violation occurs during processing. Who will be held legally responsible?

79 / 150

79. Which of the following types of risk could result in bankruptcy?

80 / 150

80. Which of the following is the BEST control for securing data on mobile universal serial bus (USB) drives?

81 / 150

81. A substantive test to verify that tape library inventory records are accurate is:

82 / 150

82. Which of the following provides the formal authorization on user access?

83 / 150

83. The PRIMARY objective for selecting risk response options is to:

84 / 150

84. You work as a project manager for ACMECompany Inc. You are about to complete the quantitative risk analysis process for your project. You can use three available tools and techniques to complete this process. Which one of the following is NOT a tool or technique that is appropriate for the quantitative risk analysis process?

85 / 150

85. The Chief Information Officer (CIO) of an enterprise has just received this year's IT security audit report. The report shows numerous open vulnerability findings on both business-critical and nonbusiness-critical information systems. The CIO briefed the Chief Executive Officer (CEO) and board of directors on the findings and expressed his concern about the impact on the enterprise. He was informed that there are not enough funds to mitigate all of the findings from the report. The CIO should respond to the findings identified in the IT security audit report by mitigating:

86 / 150

86. Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

87 / 150

87. Which of the following BEST indicates a successful risk management practice?

88 / 150

88. Risk scenarios enable the risk assessment process because they:

89 / 150

89. John works as a project manager for the ABC project. In this project, John is preparing to identify stakeholders so he can communicate project requirements, status, and risks. John has elected to use a salience model as part of his stakeholder identification process. Which of the following activities BEST describes a salience model?

90 / 150

90. The PRIMARY advantage of creating and maintaining a risk register is to:

91 / 150

91. Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''

92 / 150

92. Which of the following is the MOST important reason for conducting security awareness programs throughout an enterprise?

93 / 150

93. What is the PRIMARY reason to periodically review key performance indicators (KPIs)?

94 / 150

94. Which of the following environments typically represents the GREATEST risk to organizational security?

95 / 150

95. Which of the following is the MAIN reason to continuously monitor IT-related risk?

96 / 150

96. Malware has been detected that redirects users' computers to websites crafted specifically for fraud. The malware changes domain name system (DNS) server settings, redirecting users to sites under the hackers' control. This scenario BEST describes a:

97 / 150

97. An enterprise has learned of a security breach at another entity that utilizes similar technology. The MOST important action a risk practitioner should take is to:

98 / 150

98. Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?

99 / 150

99. If one says that the particular control or monitoring tool is sustainable, then it refers to what ability?

100 / 150

100. It is MOST important for risk mitigation to:

101 / 150

101. Which of the following is the GREATEST risk associated with inappropriate classification of data?

102 / 150

102. A global company s business continuity plan (BCP) requires the transfer of its customer information….

103 / 150

103. Which of the following are external risk factors among the following options? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

104 / 150

104. You work as a project manager for ACMECompany Inc. You are preparing to plan risk responses for your project with your team. How many risk response types are available for a negative risk event in the project?

105 / 150

105. Mike is the project manager of the NNP Project for his organization. He is working with his project team to plan the risk responses for the NNP Project. Mike would like the project team to work together on establishing risk thresholds in the project. What is the purpose of establishing a risk threshold?

106 / 150

106. An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.

107 / 150

107. Which of the following business requirements MOST relates to the need for resilient business and information systems processes?

108 / 150

108. Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

109 / 150

109. Which of the following is the BEST metric to manage the information security program?

110 / 150

110. After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to:

111 / 150

111. You are the project manager of the ABC project. You are working with the project team to create a plan to document the procedures to manage risks throughout the project. This document will define how risks will be identified and quantified. It will also define how contingency plans will be implemented by the project team. What document do you and your team create in this scenario?

112 / 150

112. A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

113 / 150

113. You are the risk official at ACMECompany Inc. You are asked to perform a risk assessment on the impact of losing network connectivity for 1 day. Which of the following factors would you include?

114 / 150

114. Which of the following capability dimensions is MOST important when using a maturity model for assessing the risk management process?

115 / 150

115. Which of the following MOST likely indicates that a customer data warehouse should remain in-house rather than be outsourced to an offshore operation?

116 / 150

116. An effective control environment is BEST indicated by controls that:

117 / 150

117. You work as a project manager for ACMECompany Inc. Management has asked you to work with the key project stakeholders to analyze the risk events you have identified in the project. They would like you to analyze the project risks to improve the project's performance as a whole. What approach can you use to achieve this goal of improving the project's performance through risk analysis with your project stakeholders?

118 / 150

118. During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:

119 / 150

119. An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?

120 / 150

120. The PRIMARY reason to report significant changes in IT risk to management is to:

121 / 150

121. Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?

122 / 150

122. A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?

123 / 150

123. Which of the following is the BEST indication of the effectiveness of a business continuity program?

124 / 150

124. Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?

125 / 150

125. A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

126 / 150

126. The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:

127 / 150

127. Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

128 / 150

128. Which of the following would BEST help secure online financial transactions from improper users?

129 / 150

129. Which of the following is the MOST effective inhibitor of relevant and efficient communication?

130 / 150

130. Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?

131 / 150

131. Which of the following should be the HIGHEST priority when developing a risk response?

132 / 150

132. An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?

133 / 150

133. A risk practitioner has collected several IT-related key risk indicators (KRIs) related to the core financial application. These would MOST likely be reported to:

134 / 150

134. You are the project manager of the ABC project for your company. To help you communicate project status to your stakeholders, you are going to create a stakeholder register. All of the following information should be included in the stakeholder register except for which one?

135 / 150

135. Simon is the project manager of the ABC project. He concluded while the ABC project was in process that if he adopted e-commerce, his project could be more fruitful. However, he did not engage in electronic commerce (e-commerce) so that he would escape from the risk associated with that line of business. What type of risk response had he adopted?

136 / 150

136. The GREATEST advantage of performing a business impact analysis (BIA) is that it:

137 / 150

137. Which of the following is the MOST important enabler of effective risk management?

138 / 150

138. Deriving the likelihood and impact of risk scenarios through statistical methods is BEST described as:

139 / 150

139. In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

140 / 150

140. Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?

141 / 150

141. Which of the following factors will have the GREATEST impact on the type of information security governance model that an enterprise adopts?

142 / 150

142. Tom works as a project manager for ACMECompany Inc. He is determining which risks can affect the project. Which of the following inputs of the identify risks process is useful in identifying risks, and provides a quantitative assessment of the likely cost to complete the scheduled activities?

143 / 150

143. The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?

144 / 150

144. Which of the following risks refers to the probability that an actual return on an investment will be lower than the investor's expectations?

145 / 150

145. Which of the following would BEST help to ensure that identified risk is efficiently managed?

146 / 150

146. Which of the following risk response options is MOST likely to increase the liability of the enterprise?

147 / 150

147. An objective of a risk management program is to:

148 / 150

148. During a quarterly interdepartmental risk assessment, the IT operations centre indicates a heavy increase in malware attacks. Which of the following recommendations to the business is MOST appropriate?

149 / 150

149. Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

150 / 150

150. If one says that the particular control or monitoring tool is sustainable, then it refers to what ability?

Your score is

The average score is 0%

Please rate this exam simulator

Making those questions and answer explanations took countless hours and weekends. Your feedback will help me in the future to give you a better experience. Thank you!

What’s your Reaction?
0
0
0
0
0
0
0

Additional materials

null

Review Manual

A copy of the current CRISC® Review Manual is essential (in theory) for any exam candidate. Unless you already have your copy, you can purchase the CRISC® Review Manual on the official ISACA CRISC website.
ISACA store
null

CRISC® QAE

The “Questions, Answers & Explanations (QAE) Manual” was publicly available a few years ago (definitely, when I was taking the CRISC® exam). Its purpose was to guide and assist question writers, making them more skilled in writing exam questions.
CRISC QAE
null

The ISACA Glossary

People taking the ISACA exam are generally quite experienced, so it may sound like a joke or an easy way to “fill the gaps” on the website, so UX design is better 🙂

However, believe me, after passing more than 200 exams, I can say that each organization/certification body has its “flavours” and sometimes slightly different definitions of common topics. So it’s valuable to at least take a glimpse at a glossary once.

ISACA Glossary
null

The Risk IT Framework 2nd Edition

The MOST important position that MUST be read before the CRISC® exam.

The Risk IT offers a structured, systematic methodology for enterprise-wide risk management, which is the backbone of the entire CRISC® exam.

Together with the “The Risk IT Practitioner Guide”, both publications were the most important books that I read before the exam. IMHO they are even more important than the Review Manual itself.

ISACA website
null

The Risk IT Practitioner Guide 2nd Edition

The MOST important position that MUST be read before the CRISC® exam.

The Risk IT Practitioner Guide contains practical and more detailed guidance on how to accomplish some of the activities described in the process model, which is the backbone of the entire CRISC® exam.

Together with the “Risk IT Framework”, both publications were the most important books that I read before the exam. IMHO they are even more important than the Review Manual itself.

ISACA website

Mind map

For self-learning

Mind Map

Your voice matters

Feedback appreciated!

After over 20 years in IT and personally clearing more than 200 certifications in IT, InfoSec, management, coaching, mentoring, and training, and 10 years since I passed ISACA CRISC, it’s time to give something back to the community.

I hope you will find my exam simulator valuable on your journey. The simulator is not just a tool to help you pass your upcoming CRISC exam, but also to learn and understand the knowledge areas associated with the specific domain you are studying. Passing an exam shouldn’t be the ultimate goal, but a checkpoint in your never-ending self-development journey.

Don’t hesitate to contact me if you have any questions. Moreover, should you encounter any issues, bugs, or typos in the exam, your assistance in enhancing the simulator would be greatly appreciated. Please utilize the pink icon during the exam (under the navigation buttons) to submit any problematic questions for review.

See Exam Simulators
Questions contain an error or are unclear? By clicking on the icon above during the exam, you can anonymously report a problematic question for my review.
COBIT®, CISA®, CISM®, CRISC®, and CGEIT® are registered trademarks of the Information Systems Audit and Control Association (ISACA)®.
The COBIT® 5 logo is a trademark of the Information Systems Audit and Control Association (ISACA)®.
All intellectual property rights of products and logos found on this website are owned by their respective organisations.
Subscribe To Our Newsletter

Subscribe To Our Newsletter

Join our mailing list to receive the latest news and updates from our team.

GDPR EN

You have Successfully Subscribed!