Skip to main content

Symulator Egzaminu CRISC® znacząco pomoże Ci zdać egzamin ISACA® Certyfikowany w Zarządzaniu Ryzykiem i Kontroli Systemów Informatycznych (CRISC®).

Przewiń do Symulatora!
0
‎ pytań
z objaśnieniami odpowiedzi
Mobile Friendly

1200+
pytań

Wyniki per
kategoria

Objaśnienia
odpowiedzi(*)

Tryb skupienia,
pełnoekranowy

Oznaczanie
pytań

Zgłaszanie
uwag

*czasami wpierw dodam pytania (jako MVP), pracując w kolejnych dniach nad wyjaśnieniami. Więc nie martw się, Huston, wszystko jest ok!

Report a question

You cannot submit an empty report. Please add some details.
0 głosy, 0 średnia
0
Utworzony przez Miroslaw Dabrowski

CRISC® Exam Simulator

multiple choice exam (ABCD)
one or multiple correct answers per question
# of questions: 150 | ~56% to pass
duration: 240 minutes
closed book exam

Exam questions database size: 1232
Copyright © Mirosław Dąbrowski

1 / 150

1. A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?

2 / 150

2. Management wants to ensure that IT is successful in delivering against business requirements. Which of the following BEST supports that effort?

3 / 150

3. Which of the following BEST enables a peer review of an enterprise’s risk management process?

4 / 150

4. Which of the following is the PRIMARY accountability for a control owner?

5 / 150

5. Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?

6 / 150

6. In the project initiation phase of the System Development Life Cycle (SDLC), there is information on a project initiated by which of the following role carriers?

7 / 150

7. You are the risk professional at ACMECompany Inc. A risk is identified and the enterprise wants to quickly implement control by applying a technical solution that deviates from the company's policies. What you should do?

8 / 150

8. Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?

9 / 150

9. Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?

10 / 150

10. Which of the following will BEST prevent external security attacks?

11 / 150

11. Who is PRIMARILY accountable for risk treatment decisions?

12 / 150

12. Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

13 / 150

13. Ted is the project manager of the ABC project for his company. Management has asked that Ted periodically reviews the contingency reserve as risk events happen, pass, or are still pending. What is the purpose of reviewing the contingency reserve?

14 / 150

14. Which of the following BEST helps the risk practitioner identify IS control deficiencies?

15 / 150

15. An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

16 / 150

16. Which of the following is the BEST course of action to help reduce the probability of an incident recurring?

17 / 150

17. Which of the following is the GREATEST benefit of implementing an enterprise risk management (ERM) program?

18 / 150

18. During an internal assessment, an enterprise notes that only a couple dozen hard-coded individual transactions are being logged, which does not encompass what should be logged to meet regulatory requirements. The individual server log files use first in, first out (FIFO). Most files recycle in less than 24 hours. What is the MOST financially damaging vulnerability associated with the current logging practice?

19 / 150

19. Which section of the Sarbanes-Oxley Act specifies "Periodic financial reports must be certified by CEO and CFO"?

20 / 150

20. Which of the following is the process of numerically analyzing the effects of identified risks on the overall enterprise's objectives?

21 / 150

21. Which of the following BEST enables detection of ethical violations committed by employees?

22 / 150

22. You are the project manager of an ABC project. You have been actively communicating and working with the project stakeholders. One of the outputs of the "manage stakeholder expectations" process can actually create new risk events for your project. Which output of the manage stakeholder expectations process can create risks?

23 / 150

23. Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?

24 / 150

24. Jane, the Director of Sales, contacts you and demands that you add a new feature to the software your project team is creating for the organization. In the meeting, she tells you how important the scope change would be. You explain to her that the software is almost finished and adding a change now could cause the deliverable to be late, cost additional funds, and would probably introduce new risks to the project. Jane stands up and says to you, "I am the Director of Sales and this change will happen in the project." And then she leaves the room. What should you do with this verbal demand for a change in the project?

25 / 150

25. Which of the following would be an IT business owner’s BEST course of action following an unexpected increase in emergency changes?

26 / 150

26. Which of the following is the BEST indication of an effective risk management program?

27 / 150

27. A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:

28 / 150

28. A network vulnerability assessment is intended to identify:

29 / 150

29. When configuring a biometric access control system that protects a high-security data center, the system’s sensitivity level should be set to:

30 / 150

30. An enterprise has identified risk events in a project. While responding to these identified risk events, which among the following stakeholders is MOST important for reviewing risk response options to an IT risk?

31 / 150

31. What are the three PRIMARY steps to be taken to initialize the project? Choose ALL OPTIONS THAT APPLY, each representing a complete solution.

32 / 150

32. You are a project manager for your organization and you're working with four of your key stakeholders. One of the stakeholders is confused as to why you're not discussing the current problem in the project during the risk identification meeting. Which one of the following statements BEST addresses when a project risk happens?

33 / 150

33. Which of the following is a KEY outcome of risk ownership?

34 / 150

34. A lack of adequate controls represents:

35 / 150

35. An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?

36 / 150

36. Which of the following is the BEST way to identify changes in the risk profile of an organization?

37 / 150

37. When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?

38 / 150

38. Which of the following is the PRIMARY reason for periodically monitoring key risk indicators (KRIs)?

39 / 150

39. Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?

40 / 150

40. Which of the following do NOT indirect information?

41 / 150

41. You are the risk professional at ACMECompany Inc. You have identified a risk and want to implement a specific risk mitigation activity. What you should PRIMARILY utilize?

42 / 150

42. Which of the following is an example of postincident response activity?

43 / 150

43. You are the project manager of the ABC project. Your project utilizes a machine for the production of goods. This machine has the specification that if its temperature rises above 450 degrees Fahrenheit then it may result in the burning of windings. So, there is an alarm which blows when the machine's temperature reaches 430 degrees Fahrenheit and the machine is shut off for 1 hour. What role does alarm play a role here?

44 / 150

44. You are the project manager of the ABC project. You have implemented an automated tool to analyze and report on access control logs based on severity. This tool generates excessively large amounts of results. You perform a risk assessment and decide to configure the monitoring tool to report only when the alerts are marked "critical". What you should do to fulfil that?

45 / 150

45. A rule-based data loss prevention (DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?

46 / 150

46. Which of the following is MOST important for effective risk management?

47 / 150

47. Which of the following is the MOST important input when developing risk scenarios?

48 / 150

48. Which of the following elements of a risk register is MOST likely to change as a result of change in management’s risk appetite?

49 / 150

49. An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

50 / 150

50. Shawn is the project manager of the ABC project. In this project, Shawn's team reports that they have found a way to complete the project work more cheaply than what was originally estimated earlier. The project team presents a new software that will help to automate the project work. While the software and the associated training costs $25,000 it will save the project nearly $65,000 in total costs. Shawn agrees to the software and changes the project management plan accordingly. What type of risk response had been used by him?

51 / 150

51. Which of the following approaches to corporate policy BEST supports an enterprise's expansion to other regions, where different local laws apply?

52 / 150

52. Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?

53 / 150

53. Risk scenarios should be created PRIMARILY based on which of the following?

54 / 150

54. Which of the following is the BEST indicator that incident response training is effective?

55 / 150

55. Which of the following BEST represents the desired risk posture for an organization?

56 / 150

56. During a risk assessment of a start-up company with a bring-your-own-device (BYOD) practice, a risk practitioner notes that the database administrator (DBA) minimizes a social media website on his/her device before running a query of credit card account numbers on a third-party cloud application. The risk practitioner should recommend that the enterprise:

57 / 150

57. Which of the following is MOST important for senior management to review during an acquisition?

58 / 150

58. Which one of the following is the only output for the qualitative risk analysis process?

59 / 150

59. Which of the following documents is described in the statement? "It is developed along with all processes of risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

60 / 150

60. An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:

61 / 150

61. Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?

62 / 150

62. John is the project manager of the ABC project for his company. His project has 75 stakeholders, some of which are external to the organization. John needs to make certain that he communicates about risk in the most appropriate method for the external stakeholders. Which project management plan will be the BEST guide for John to communicate to the external stakeholders?

63 / 150

63. You are elected as the project manager of the ABC project. You have to initiate the project. Your Project request document has been approved, and now you have to start working on the project. What is the FIRST step you should take to initialize the project?

64 / 150

64. What are the fundamental principles of access controls among the following options? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

65 / 150

65. For a large software development project, risk assessments are MOST effective when performed:

66 / 150

66. When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:

67 / 150

67. Which of the following is the FIRST step when developing a risk monitoring program?

68 / 150

68. Which of the following is the PRIMARY reason for an organization to ensure the risk register is updated regularly?

69 / 150

69. Which of the following establishes mandatory rules, specifications and metrics used to measure compliance against quality, value, etc?

70 / 150

70. What is the MAIN benefit of using a top-down approach to develop risk scenarios?

71 / 150

71. Which of the following is the MOST effective key performance indicator (KPI) for change management?

72 / 150

72. Which among the following acts as a trigger for the risk response process?

73 / 150

73. The Identify Risk process determines the risks that affect the project and documents their characteristics. Why should the project team members be involved in the Identify Risk process?

74 / 150

74. Which of the following documents is described in the statement below? "It is developed along with all processes of the risk management. It contains the results of the qualitative risk analysis, quantitative risk analysis, and risk response planning."

75 / 150

75. Which of the following would BEST help minimize the risk associated with social engineering threats?

76 / 150

76. Which of the following is the BEST way to verify that critical production servers are utilizing up-to-date antivirus signature files?

77 / 150

77. Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?

78 / 150

78. Which of the following should be the PRIMARY input to determine risk tolerance?

79 / 150

79. Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

80 / 150

80. Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?

81 / 150

81. The PRIMARY goal of a postincident review is to:

82 / 150

82. The MOST effective starting point to determine whether an IT system continues to meet the enterprise's business objectives is to conduct interviews with:

83 / 150

83. Which type of risk assessment methods involves conducting interviews and using anonymous questionnaires by subject matter experts?

84 / 150

84. Which of the following is the BEST reason to perform a risk assessment?

85 / 150

85. An organization is considering acquiring a new line of business and wants to develop new IT risk scenarios to guide its decisions. Which of the following would add the MOST value to the new risk scenarios?

86 / 150

86. To which level the risk should be reduced to accomplish the objective of risk management?

87 / 150

87. Which of the following is the PRIMARY consideration when establishing an organization’s risk management methodology?

88 / 150

88. Which of the following provides the MOST valuable input to incident response efforts?

89 / 150

89. You are elected as the project manager of the ABC project. You are in the project initialization phase and are busy defining requirements for your project. While defining requirements you are describing how users will interact with a system. Which of the following requirements are you defining here?

90 / 150

90. Which of the following is the BEST way of managing risk inherent to wireless networks?

91 / 150

91. Which of the following will BEST mitigate the risk associated with IT and business misalignment?

92 / 150

92. During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:

93 / 150

93. You are working on a project in an enterprise. Some part of your project requires e-commerce, but your enterprise chooses not to engage in e-commerce. This scenario demonstrates which of the following forms?

94 / 150

94. Which individuals or positions within the organization will decide about the Key Risk Indicators (KRIs) for the enterprise? Choose TWO OPTIONS THAT APPLY, each representing a part of the solution.

95 / 150

95. A key objective when monitoring information systems control effectiveness against the enterprise’s external requirements is to:

96 / 150

96. Which of the following is the BEST indicator of the effectiveness of a control action plan’s implementation?

97 / 150

97. Risk response should focus on which of the following?

98 / 150

98. Which of the following is described by the definition given below? "It is the expected guaranteed value of taking a risk."

99 / 150

99. Who should be PRIMARILY responsible for establishing an organization's IT risk culture?

100 / 150

100. An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?

101 / 150

101. Out of several risk responses, which of the following risk responses is used for negative risk events?

102 / 150

102. Which of the following is BEST suited for the review of IT risk analysis results before the results are sent to management for approval and use in decision making?

103 / 150

103. Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

104 / 150

104. A risk response report includes recommendations for:

105 / 150

105. Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?

106 / 150

106. Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual loss expectancy (ALE)?

107 / 150

107. Which of the following statements is true for risk communication? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

108 / 150

108. An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?

109 / 150

109. Who should be accountable for the risk to an IT system that supports a critical business process?

110 / 150

110. When an organization’s disaster recovery plan has a reciprocal agreement, which of the following risk treatment options is being applied?

111 / 150

111. During qualitative risk analysis, you want to define the risk urgency assessment. All of the following are indicators of risk priority except for which one?

112 / 150

112. When reviewing the business continuity plan (BCP) of an online sales order system, a risk practitioner notices that the recovery time objective (RTO) has a shorter lime than what is defined in the disaster recovery plan (DRP). Which of the following is the BEST way for the risk practitioner to address this concern?

113 / 150

113. Deriving the likelihood and impact of risk scenarios through statistical methods is BEST described as:

114 / 150

114. You are the project manager of a large construction project. Part of the project involves the wiring of the electricity in the building your project is creating. You and the project team determine the electrical work is too dangerous to perform yourself so you hire an electrician to perform the work for the project. This is an example of what type of risk response?

115 / 150

115. You work as a project manager for ACMECompany Inc. You are about to complete the quantitative risk analysis process for your project. You can use three available tools and techniques to complete this process. Which one of the following is NOT a tool or technique that is appropriate for the quantitative risk analysis process?

116 / 150

116. Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?

117 / 150

117. Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?

118 / 150

118. The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:

119 / 150

119. Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

120 / 150

120. What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?

121 / 150

121. When is the BEST to identify risk associated with major project to determine a mitigation plan?

122 / 150

122. Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?

123 / 150

123. What risk elements are part of the COSO ERM framework among the following options? Choose THREE OPTIONS THAT APPLY, each representing a complete solution.

124 / 150

124. To define the risk management strategy which of the following MUST be set by the board of directors?

125 / 150

125. For which of the following risk management capability maturity levels do the statement given below is true? "Real-time monitoring of risk events and control exceptions exists, as does automation of policy management"

126 / 150