ISACA CRISC Exam Questions
Certified in Risk and Information Systems Control (Page 42 )

Updated On: 24-Feb-2026

Which of the following BEST protects organizational data within a production cloud environment?

  1. Data encryption
  2. Continuous log monitoring
  3. Right to audit
  4. Dataobfuscation

Answer(s): A

Explanation:

Data encryption is the best method to protect organizational data within a production cloud environment, as it ensures the confidentiality, integrity, and availability of the data. Data encryption is the process oftransforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt the data. Data encryption can protect data at rest (stored in the cloud) and data in transit (transferred over the network) from unauthorized access, modification, or deletion by malicious actors or accidental errors. Data encryption can also help organizations comply with legal, regulatory, and contractual requirements for data protection and privacy, such as GDPR, CCPA, and PCI DSS.


Reference:

·The Complexity Conundrum: Simplifying Data Security1 ·Practical Data Security and Privacy for GDPR and CCPA2



The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:

  1. allocation of available resources
  2. clear understanding of risk levels
  3. assignment of risk to the appropriate owners
  4. risk to be expressed in quantifiable terms

Answer(s): B

Explanation:

The most significant benefit of using a consistent risk ranking methodology across an organization is that it enables a clear understanding of risk levels, as this facilitates the comparison and prioritization of risks, the communication and reporting of risks, and the alignment of risk management with the enterprise's objectives and strategy. A consistent risk ranking methodology is a set of criteria and scales that are used to measure and rate the likelihood and impact of risks, as well as other factors such as urgency, velocity, and persistence. A consistent risk ranking methodology ensures that the risk assessment results are objective, reliable, and comparable across different business units, processes, and projects. The other options are not the most significant benefits of using a consistent risk ranking methodology,although they may be secondary benefits or outcomes of doing so. References = Risk and Information Systems Control Study Manual, Chapter 3: IT Risk Assessment, page 97.



Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?

  1. Derive scenarios from IT risk policies and standards.
  2. Map scenarios to a recognized risk management framework.
  3. Gather scenariosfrom senior management.
  4. Benchmark scenarios against industry peers.

Answer(s): B

Explanation:

IT risk scenarios are the descriptions or representations of the possible or hypothetical situations or events that may cause or result in an IT risk for the organization. IT risk scenarios usually consist of three elements: a threat or source of harm, a vulnerability or weakness, and an impact or consequence.
The best approach to use when creating a comprehensive set of IT risk scenarios is to map scenarios to a recognized risk management framework, which is an established or recognized model or standard that provides the principles, guidelines, and best practices for the organization's IT risk management function. Mapping scenarios to a recognized risk management framework can help the organization to create a comprehensive set of IT risk scenarios by providing the following benefits:
It can ensure that the IT risk scenarios are relevant, appropriate, and proportional to the organization's IT objectives and needs, and that they support the organization's IT strategy and culture.

It can ensure that the IT risk scenarios are consistent and compatible with the organization's IT governance, risk management, and control functions, and that they reflect the organization's IT risk appetite and tolerance.
It can provide useful references and benchmarks for the identification, analysis, evaluation, and communication of the IT risk scenarios, and for the alignment and integration of the IT risk scenarios with the organization's IT risk policies and standards. The other options are not the best approaches to use when creating a comprehensive set of IT risk scenarios, because they do not provide the same level of detail and insight that mapping scenarios to a recognized risk management framework provides, and they may not be specific or applicable to the organization's IT objectives and needs.

Deriving scenarios from IT risk policies and standards means creating or generating the IT risk scenarios based on the rules or guidelines that define and describe the organization's IT risk management function, and that specify the expectations and requirements for the organization's IT risk management function. Deriving scenarios from IT risk policies and standards can help the organization to create a consistent and compliant set of IT risk scenarios, but it is not the best approach, because it may not cover all the relevant or significant IT risks that may affect the organization, and it may not support the organization's IT strategy and culture.
Gathering scenarios from senior management means collecting or obtaining the IT risk scenarios from the senior management or executives that oversee or direct the organization's IT activities or functions. Gathering scenarios from senior management can help the organization to create a high-level and strategic set of IT risk scenarios, but it is not the best approach, because it may not reflect the operational or technical aspects of the IT risks, and it may not involve the input or feedback from the other stakeholders or parties that are involved or responsible for the IT activities or functions. Benchmarking scenarios against industry peers means comparing and contrasting the IT risk scenarios with those of other organizations or industry standards, and identifying the strengths, weaknesses, opportunities, or threats that may affect the organization's IT objectives oroperations. Benchmarking scenarios against industry peers can help the organization to create a competitive and innovative set of IT risk scenarios, but it is not the best approach, because it may not be relevant or appropriate for the organization's IT objectives and needs, and it may not comply with the organization's IT policies and standards. References =
ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 19-20, 23-24, 27-28, 31-32, 40-41, 47-48, 54-55, 58-59, 62-63
ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 199 CRISC Practice Quiz and Exam Prep



Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?

  1. Prepare a report for senior management.
  2. Assign responsibility and accountability for the incident.
  3. Update the risk register.
  4. Avoid recurrence of the incident.

Answer(s): D

Explanation:

The primary reason to establish the root cause of an IT security incident is to avoid recurrence of the incident. By identifying and addressing the underlying cause of the incident, the organization can prevent or reduce the likelihood of similar incidents in the future. This can also help to improve the security posture and resilience of the organization. The other options are not the primary reason, but they may be secondary or tertiary reasons. Preparing a report for senior management is an important step in communicating the incident and its impact, but it does not address the root cause. Assigning responsibility and accountability for the incident is a way to ensure that the appropriate actions are taken to remediate the incident and prevent recurrence, but it is not the reason to establish the root cause. Updating the risk register is a part of the risk management process, but it does not necessarily prevent recurrence of the incident. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 4: Risk Response and Reporting, Section 4.3:
Incident Management, p. 223-224.



After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:

  1. record risk scenarios in the risk register for analysis.
  2. validate the risk scenarios for business applicability.
  3. reduce the number of risk scenarios to a manageable set.
  4. perform a risk analysis on the riskscenarios.

Answer(s): B

Explanation:

According to the LDR514: Security Strategic Planning, Policy, and Leadership Course, after mapping generic risk scenarios to organizational security policies, the next course of action should be to validate the risk scenarios for business applicability. This is because generic risk scenarios are not specific to the organization's context, objectives, and environment, and they may not capture the unique threats, vulnerabilities, and impacts that the organization faces. Therefore, validating the risk scenarios for business applicability will help to ensure that the risk scenarios are relevant, realistic, and consistent with the organization's security policies. Validating the risk scenarios will also help to identify any gaps, overlaps, or conflicts between the risk scenarios and the security policies, and to resolve themaccordingly. References = LDR514: Security Strategic Planning, Policy, and Leadership Course, Risk Assessment and Analysis Methods: Qualitative and Quantitative






Post your Comments and Discuss ISACA CRISC exam dumps with other Community members:

Join the CRISC Discussion