ISACA CRISC Exam Questions
Certified in Risk and Information Systems Control (Page 21 )

Updated On: 24-Feb-2026

To help identify high-risk situations, an organization should:

  1. continuously monitor the environment.
  2. develop key performance indicators (KPIs).
  3. maintain a risk matrix.
  4. maintain a risk register.

Answer(s): A

Explanation:

To help identify high-risk situations, an organization should continuously monitor the environment, as it can help to detect and respond to any changes or emerging risks that may affect the organization's objectives and strategy. Continuous monitoring can also provide timely and relevant feedback and information to the decision-makers and stakeholders, and enable them to adjust the risk strategy and response actions accordingly. Continuous monitoring can also help to ensure that the risk management process is aligned with the organization's risk appetite andtolerance, and supports the achievement of the organization's goals and value creation. References = ISACA Certified in Risk and Information Systems Control (CRISC)Certification Exam Question and Answers, Question 243. CRISC: Certified in Risk & Information Systems Control Sample Questions, Question 243. CRISC Sample Questions 2024, Question 243.



Which of the following should be the GREATEST concern for an organization that uses open source software applications?

  1. Lack of organizational policy regarding open source software
  2. Lack of reliability associated with the use of open source software
  3. Lack of monitoring over installation of open source software in the organization
  4. Lack of professional supportfor open source software

Answer(s): A

Explanation:

Lack of organizational policy regarding open source software should be the greatest concern for an organization that uses open source software applications, as it may expose the organization to legal, security, and operational risks. Open source software is software that is freely available and can be modified and distributed by anyone, subject to certain conditions and licenses. An organizational policy regarding open source software should define the criteria and procedures for selecting, acquiring, using, and maintaining open source software, as well as the roles and responsibilities of the stakeholders involved. Lack of reliability, lack of monitoring, and lack of professional support are not the greatest concerns, as they can be addressed by implementing quality assurance, configuration management, and community engagement practices for open source software. References = CRISC by Isaca Actual Free Exam Q&As, question 214; CRISC: Certified in Risk & Information Systems Control Sample Questions, question 214.



Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

  1. Data duplication processes
  2. Data archival processes
  3. Data anonymization processes
  4. Data protection processes

Answer(s): B

Explanation:

Data archival processes should be the primary focus of a risk practitioner when ensuring that organization records are being retained for a sufficient period of time to meet legal obligations, because data archival processes ensure that records are stored securely, reliably, and accessibly for as long as they are needed. Data archival processes also help to manage the storage capacity, retention policies, and disposal procedures of records. Data duplication processes are not the primary focus, because they are mainly used for backup and recovery purposes, not for long-term retention. Data anonymization processes are not the primary focus, because they are mainly used for privacy and confidentiality purposes, not for legal compliance. Data protection processes are not the primary focus, because they are mainly used for security and integrity purposes, not for retention requirements. References = Free ISACA CRISC Sample Questions and Study Guide



Which of the following would BEST ensure that identified risk scenarios are addressed?

  1. Reviewing the implementation of the risk response
  2. Creating a separate risk register for key business units
  3. Performing real-time monitoring of threats
  4. Performing regular risk control self-assessments

Answer(s): A

Explanation:

The best way to ensure that identified risk scenarios are addressed is to review the implementation of the risk response. The risk response is the action or plan that is taken to reduce, avoid, transfer, or accept the risk, depending on the chosen risk treatment option1. Reviewing the implementation of the risk response means checking whether the risk response actions are executed as planned, whether they are effective and efficient in mitigating the risk, and whether they are aligned with the organization's objectives and risk appetite2. Reviewing the implementation of the risk response helps to monitor and control the risk, identify any gaps or issues, and make any necessary adjustments or improvements. The other options are not the best ways to ensure that identified risk scenarios are addressed, as they are either less comprehensive or less specific than reviewing the implementation of the risk response. Creating a separate risk register for key business units is a way of documenting and tracking the risks that affect different parts of the organization. However, this is not the same as addressing the risk scenarios, as it does not indicate how the risks are treated or resolved. Performing real-time monitoring of threats is a way of detecting and responding to any changes or events that may increase the likelihood or impact of the risks. However, this is not the same as addressing theriskscenarios, as it does not measure the effectiveness or efficiency of the risk response actions. Performing regular risk control self- assessments is a way of evaluating and testing the design and operation of the controls that are implemented to mitigate the risks. However, this is not the same as addressing the risk scenarios, as it does not cover the other aspects of the risk response, such as risk avoidance, transfer, or acceptance. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 2, Section 2.1.7, Page 59.



Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?

  1. Ensuring availability of resources for log analysis
  2. Implementing log analysis tools to automate controls
  3. Ensuring the control is proportional to the risk
  4. Building correlations between logs collected from different sources

Answer(s): C

Explanation:

The primary consideration when implementing controls for monitoring user activity logs is ensuring that the control is proportional to the risk, because this helps to optimize the balance between the benefits and costs of the control, and to avoid over- or under-controlling the risk. User activity logs are records of the actions or events performed by users on IT systems, networks, or resources, such as accessing, modifying, or transferring data or files. Monitoring user activity logs can help to detect and prevent potential threats, such as unauthorized access, data leakage, or malicious activity, and to support the investigation and remediation of incidents. However, monitoring user activity logs also involves certain costs and challenges, such as collecting, storing, analyzing, and reporting large amounts of log data, ensuring the accuracy, completeness, and timeliness of the log data, protecting the privacy and security of the log data, and complying with the relevant laws and regulations.

Therefore, when implementing controls for monitoring user activity logs, the organization should consider the level and impact of the risk that the control is intended to address, and the value and effectiveness of the control in reducing the risk exposure and impact. The organization should also consider the costs and feasibility of implementing and maintaining the control, and the potential negative consequences or side effects of the control, such as performance degradation, user dissatisfaction, or legal liability. By ensuring that the control is proportional to the risk, the organization can achieve the optimal level of risk management, and avoid wasting resources or creating new risks. References = Risk IT Framework, ISACA, 2022, p. 151






Post your Comments and Discuss ISACA CRISC exam dumps with other Community members:

Join the CRISC Discussion