ISACA CRISC Exam Questions
Certified in Risk and Information Systems Control (Page 37 )

Updated On: 24-Feb-2026

Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?

  1. Mean time between failures (MTBF)
  2. Mean time to recover (MTTR)
  3. Planned downtime
  4. Unplanned downtime

Answer(s): A

Explanation:

Mean time between failures (MTBF) is a key performance indicator (KPI) that measures the average time that a system or component operates without interruption or failure. MTBF is a common metric for reliability and availability of IT services. A higher MTBF indicates a lower frequency of failures and a higher ability to deliver uninterrupted IT services. According to the CRISC Review Manual 2022, MTBF is one of the KPIs for IT service delivery1. According to the CRISC Review Questions, Answers & Explanations Manual 2022, MTBF is the correct answer to this question2. Mean time to recover (MTTR), planned downtime, and unplanned downtime are not the best KPIs to measure the ability to deliver uninterrupted IT services. MTTR measures the average time that it takes to restore a system or component to normal operation after a failure. Planned downtime measures the scheduled time that a system or component is not available for use due to maintenance or upgrades. Unplanned downtime measures the unscheduled time that a system or component is not available for use due to failures or incidents. These

KPIs are useful for measuring the impact and duration of service interruptions, but they do not directly reflect the ability to prevent or avoid service interruptions.



The risk associated with a high-risk vulnerability in an application is owned by the:

  1. security department.
  2. business unit
  3. vendor.
  4. IT department.

Answer(s): B

Explanation:

A high-risk vulnerability in an application is a system flaw or weakness in the application's code that can be exploited by a malicious actor, potentially leading to a security breach. The risk associated with a high-risk vulnerability in an application is the possibility and impact of such a breach occurring. The risk owner of a high-risk vulnerability in an application is the person or entity who has the authority and responsibility for managing the risk. The risk owner should be able to define the risk appetite, assess the risk level, select and implement the risk response, monitor and report the risk status, and ensure the risk alignment with the business objectives and strategy. The risk owner of a high-risk vulnerability in an application is the business unit, which is the organizational unit that operates the application and derives value from it. The businessunit understands the business needs and expectations of the application, and the potential consequences of a security breach. The business unit also has the resources and incentives to address the risk effectively and efficiently. Therefore, the business unit is the most appropriate risk owner of a high-risk vulnerability in an application. References = Why Assigning a Risk Owner is Important and How to Do It Right, CRISC 351-400 topic3, Foundations of Project Management : Week 2.



Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?

  1. Aligning IT with short-term and long-term goals of the organization
  2. Ensuring the IT budget and resources focuson risk management
  3. Ensuring senior management's primary focus is on the impact of identified risk
  4. Prioritizing internal departments that provide service to customers

Answer(s): A

Explanation:

Enterprise risk management (ERM) is a holistic and strategic approach to managing the risks that an organization faces across its various functions, processes, and activities. ERM aims to align the organization's risk appetite and tolerance with its objectives and vision, and to optimize the value and performance of the organization1. IT risk management is a subset of ERM that focuses on identifying, assessing, and mitigating the risks related to the use of information technology (IT) in the organization. IT risk management aims to ensure the confidentiality, integrity, and availability of IT resources and information, and to support the IT governance and strategy of the organization2. The greatest benefit when ERM provides oversight of IT risk management is aligning IT with short-term and long-term goals of the organization, because it can help to:
Integrate IT risk management with the overall business strategy and risk management, and ensure that IT risks are considered and addressed at the enterprise level Align IT risk appetite and tolerance with the business risk appetite and tolerance, and ensure that IT risks are balanced with the expected benefits and opportunities Enhance IT risk awareness and communication among the stakeholders, and ensure that IT risks are reported and escalated appropriately
Optimize IT risk response and control, and ensure that IT risks are managed efficiently and effectively
Demonstrate IT risk value and impact, and ensure that IT risks are measured and monitored against the business objectives and performance34
The other options are not the greatest benefit when ERM provides oversight of IT risk management, but rather some of the outcomes or consequences of it. Ensuring the IT budget and resources focus on risk management is a benefit that can help to allocate and prioritize the IT resources and funds according to the IT risk level and the business needs. Ensuring senior management's primary focus is on the impact of identified risk is a benefit that can help to increase the senior management's involvement and accountability in IT risk management, and to support the IT risk decision making and reporting. Prioritizing internal departments that provide service to customers is a benefit that can help to improve the quality and efficiency of the IT service delivery and customer satisfaction. References = Enterprise Risk Management - ISACA
IT Risk Management - ISACA
Aligning IT risks with Enterprise Risk Management (ERM) Five Benefits of Enterprise Risk Management : Articles : Resources ...
[CRISC Review Manual, 7th Edition]



Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?

  1. Closed management action plans from the previous audit
  2. Annual risk assessment results
  3. An updated vulnerability management report
  4. A list of identified generic risk scenarios

Answer(s): B

Explanation:

The audit planning process is the process of defining and describing the scope, objectives, and approach of the internal audit that is performed to assess and evaluate the adequacy and effectiveness of the organization's governance, risk management, and control functions. The audit planning process involves identifying and prioritizing the audit areas, topics, or issues, and allocating the audit resources, time, and budget. The most important information for a risk practitioner to provide to the internal audit department during the audit planning process is the annual risk assessment results, which are the outcomes or outputs of the risk assessment process that measures and compares the likelihood and impact of various risk scenarios, and prioritizes them based on their significance and urgency. The annual risk assessment results can help the internal audit department to plan the audit by providing the following information:
The level and priority of the risks that may affect the organization's objectives and operations, and the potential consequences or impacts that they may cause for the organization if they materialize.
The gap or difference between the current and desired level of risk, and the extent or degree to which the risk responses or controls contribute to or affect the gap or difference. The cost-benefit or feasibility analysis of the possible actions or plans to address or correct the risks and their responses, and the expected or desired outcomes or benefits that they may provide for the organization.
The other options are not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because they do not provide the same level of detail and insight that the annual risk assessment results provide, and they may not be relevant or actionable for the internal audit department. Closed management action plans from the previous audit are the actions or plans that have been implemented or completed by the management to address or correct the findings or recommendations from the previous internal audit that was performed. Closed management action plans from the previous audit can provide useful information on the progress and performance of the management in improving and optimizing the organization's governance, risk management, and control functions, but they are not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because they do not indicate the current or accurate state and performance of the organization's risk profile, and they may not cover all the relevant or emerging risks that may exist or arise.
An updated vulnerability management report is a report that provides the information and status of the vulnerabilities or weaknesses in the organization's assets, processes, or systems that can be exploited or compromised by the threats or sources of harm that may affect the organization's objectives or operations. An updated vulnerability management report can provide useful information on the existence and severity of the vulnerabilities, and the actions or plans to mitigate or prevent them, but it is not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because it does not indicate the likelihood and impact of the risk scenarios that are associated with the vulnerabilities, and the potential consequences or impacts that they may cause for the organization.
A list of identified generic risk scenarios is a list that contains the descriptions or representations of the possible or hypothetical situations or events that may cause or result in a risk for the organization, without specifying the details or characteristics of the risk source, event, cause, orimpact. A list of identified generic risk scenarios can provide useful information on the types or categories of the risks that may affect the organization, but it is not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because it does not indicate the level and priority of the risks, and the potential consequences or impacts that they may cause for the organization. References =
ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 19-20, 23-24, 27-28, 31-32, 40-41, 47-48, 54-55, 58-59, 62-63
ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 188 CRISC Practice Quiz and Exam Prep



Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?

  1. To have a unified approach to risk management across the organization
  2. To have a standard risk management process for complying with regulations
  3. To optimize risk management resources acrossthe organization
  4. To ensure risk profiles are presented in a consistent format within the organization

Answer(s): A

Explanation:

The most important objective of establishing an enterprise risk management (ERM) function within an organization is to have a unified approach to risk management across the organization. An ERM function is a centralized and coordinated function that oversees and supports the risk management activities of the organization, such as risk identification, assessment, response, monitoring, and reporting. An ERM function helps to ensure that the risk management process is consistent, comprehensive, and integrated with the organization's strategy, objectives, and culture. An ERM function also helps to align the risk management activities with the organization's risk appetite and tolerance, and to provide a holistic view of the organization's risk profile and exposure. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 1, Section 1.1.1, page 131






Post your Comments and Discuss ISACA CRISC exam dumps with other Community members:

Join the CRISC Discussion