ISACA CRISC Exam Questions
Certified in Risk and Information Systems Control (Page 22 )

Updated On: 24-Feb-2026

A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments.
Which of the following i the BEST recommendation to address this situation?

  1. Enable data encryption in the test environment
  2. Implement equivalent security in the test environment.
  3. Prevent the use of production data for test purposes
  4. Mask data before being transferred to the test environment.

Answer(s): D

Explanation:

Masking data before being transferred to the test environment is the best recommendation to address the situation where sensitive data from the production environment is required for testing purposes in non-production environments. Data masking is a technique that replaces sensitive data elements with realistic but fictitious data, preserving the format, structure, and meaning of the original data. Data masking ensures that the test data is sufficiently anonymized and de-identified, while still maintaining its functionality and validity for testing purposes. Data masking also reduces the risk of data leakage, exposure, or breach in the test environment, which may have lower security controls than the production environment. The other options are not the best recommendations, as they do not adequately protect the sensitive data or meet the testingrequirements. Enabling data encryption in the test environment may protect the data from unauthorized access, but it does not prevent the data from being decrypted by authorized users who may misuse or mishandle it. Implementing equivalent security in the test environment may be costly, complex, or impractical, and it may not be feasible to replicate the same level of security controls as in the production environment. Preventing the use of production data for test purposes may not be possible or desirable, as production data may be required to ensure the accuracy, reliability, and quality of the testing results. References = P = NP: Cloud dataprotection in vulnerable non-

production environments ...; Data masking secures sensitive data in non-production environments ...; CRISC EXAM TOPIC 2 LONG Flashcards | Quizlet



Which of the following would BEST help to ensure that identified risk is efficiently managed?

  1. Reviewing the maturity of the control environment
  2. Regularly monitoring the project plan
  3. Maintaining a key risk indicator for eachasset in the risk register
  4. Periodically reviewing controls per the risk treatment plan

Answer(s): D

Explanation:

According to the CRISC Review Manual (Digital Version), periodically reviewing controls per the risk treatment plan would best help to ensure that identified risk is efficiently managed, as it involves verifying the effectiveness and efficiency of the implemented risk response actions and identifying any gaps or changes in the risk profile. Periodically reviewing controls per the risk treatment plan helps to:
Confirm that the controls are operating as intended and producing the desired outcomes Detect any deviations, errors, or weaknesses in the controls and their performance Evaluate the adequacy and appropriateness of the controls in relation to the current risk environment and the organization's risk appetite and risk tolerance Recommend and implement corrective actions or improvement measures to address any issues or deficiencies in the controls
Update the risk register and the risk treatment plan to reflect the current risk status and the residual risk levels
References = CRISC Review Manual (Digital Version), Chapter 4: IT Risk Monitoring and Reporting, Section 4.1: IT Risk Monitoring, pp. 215-2161



A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:

  1. strategy.
  2. profile.
  3. process.
  4. map.

Answer(s): B

Explanation:

A primary function of the risk register is to provide supporting information for the development of an organization's risk profile, which is a comprehensive and structured representation of therisks that the organization faces. The risk profile helps the organization to understand its risk exposure, appetite, and tolerance, and to align its risk management strategy with its business objectives and context. The risk register is a document that records and tracks the identified risks, their causes, impacts, likelihood, responses, owners, and status. The risk register is anessential input for creating and updating the risk profile, as it provides the data and analysis of the risks that need to be prioritized and addressed. The other options are not the primary function of the risk register, although they may be related to it. The risk strategy is the plan and approach for managing the risks, and it is based on the risk profile. The risk process is the set of activities and tasks for identifying, assessing, responding, and monitoring the risks, and it is facilitated by the risk register. The risk map is a graphical tool for displaying the risks based on their impact and likelihood, and it is derived from the risk register. References = Risk Register: A Project Manager's Guide with Examples [2023] · Asana; Purpose of a risk register: Here's what a risk register is used for; Risk Register: Definition, Importance, and Elements! - Bit Blog; What is a Risk Register? A Complete Guide | Capterra; Risk Registers: What Are They, When Should You Use Them, and Why?



Which of The following BEST represents the desired risk posture for an organization?

  1. Inherent risk is lower than risk tolerance.
  2. Operational risk is higher than risk tolerance.
  3. Accepted risk is higher thanrisk tolerance.
  4. Residual risk is lower than risk tolerance.

Answer(s): D

Explanation:

The best representation of the desired risk posture for an organization is when the residual risk is lower than the risk tolerance. Residual risk is the remaining risk after the implementation of risk responses or controls. Risk tolerance is the acceptable level of risk that the organization is willing to take or bear. Thedesired risk posture is when the organization has reduced the residual risk to a level that is equal to or lower than the risk tolerance, which means that the organization has achieved its risk objectives and is comfortable with the remaining risk exposure. The other options are not the best representation of the desired risk posture, as they indicate that the organization has not effectively managed its risk. Inherent risk is lower than risk tolerance means that the organization has not identified or assessed its risk properly, as inherent risk is the risk before any controls or responses are applied. Operational risk is higher than risk tolerance means that the organization has not implemented or monitored its risk responses or controls adequately, as operational risk is the risk of loss resulting from inadequate or failed internal processes,people, and systems. Accepted risk is higher than risk tolerance means that the organization has not aligned its risk appetite and risk tolerance, as accepted risk is the risk that the organization chooses to retain or take without any further action. References = Risk and Information Systems Control Study Manual, Chapter 2, Section 2.3.1, page 2-23.



Which of the following is MOST important information to review when developing plans for using emerging technologies?

  1. Existing IT environment
  2. IT strategic plan
  3. Risk register
  4. Organizational strategic plan

Answer(s): D

Explanation:

The most important information to review when developing plans for using emerging technologies is the organizational strategic plan. The organizational strategic plan is a document that defines the vision, mission, goals, and objectives of the organization. It also outlines the strategies, actions, and resources that are needed to achieve them. The organizational strategic plan provides the direction, alignment, and guidance for the use of emerging technologies, and ensures that they are aligned with and support the organizational needs and priorities. The other options are not as important as the organizational strategic plan, as they are related to the current state, specific area, or potential issues of the use of emerging technologies, not the overall purpose and value of the use of emerging technologies. References = Risk and InformationSystems Control Study Manual, Chapter 1:
IT Risk Identification, Section 1.2: IT Risk Identification Methods, page 19.






Post your Comments and Discuss ISACA CRISC exam dumps with other Community members:

Join the CRISC Discussion