Isaca Crisc Certified Risk Information Systems Control Practice Test - Set 1
Test your knowledge with this Isaca Crisc Certified Risk Information Systems Control mock exam. Get real-world IT questions and prepare for certification success.
CRISC: Certified in Risk and Information Systems Control - Exam Information
Exam Information
Exam Code
Isaca Crisc Certified Risk Information Systems Control
Exam Title
CRISC: Certified in Risk and Information Systems Control
Vendor
ISACA
Difficulty
Advanced
Duration
4 Hours
Question Format
Multiple Choice
Last Updated
March 7, 2025
CRISC certification validates expertise in identifying and managing enterprise IT risk.
1. What is the primary objective of CRISC certification?
Managing IT risk and implementing information system controls
Developing mobile applications
Performing ethical hacking
Training employees in soft skills
✅ Correct Answer: Managing IT risk and implementing information system controls
2. Which phase involves identifying and documenting IT risks?
Risk identification
Risk assessment
Risk mitigation
Risk monitoring
✅ Correct Answer: Risk identification
3. What is the purpose of a risk register?
Documenting identified risks and their status
Recording network traffic
Tracking software updates
Documenting user complaints
✅ Correct Answer: Documenting identified risks and their status
4. Which factor is essential when assessing risk likelihood?
Threat intelligence
System performance
Employee satisfaction
Budget reports
✅ Correct Answer: Threat intelligence
5. What is a residual risk?
Risk remaining after controls are applied
A new risk that arises from mitigation
An eliminated risk
A risk with no impact
✅ Correct Answer: Risk remaining after controls are applied
6. Which risk response involves transferring risk to a third party?
Risk transfer
Risk acceptance
Risk avoidance
Risk mitigation
✅ Correct Answer: Risk transfer
7. What is the primary purpose of a business impact analysis (BIA)?
Identify and quantify the impact of disruptions
Configure security controls
Develop software
Monitor network traffic
✅ Correct Answer: Identify and quantify the impact of disruptions
8. Which type of control detects incidents after they occur?
Detective
Preventive
Corrective
Directive
✅ Correct Answer: Detective
9. What is the main goal of risk mitigation?
Reduce the likelihood or impact of a risk
Completely eliminate all risks
Transfer responsibility to IT staff
Increase system performance
✅ Correct Answer: Reduce the likelihood or impact of a risk
10. Which framework is commonly used for IT risk management?
COBIT
Agile
TOGAF
ITIL
✅ Correct Answer: COBIT
11. Which document outlines the steps for responding to incidents?
Incident response plan
Project charter
Service-level agreement
Access control policy
✅ Correct Answer: Incident response plan
12. What is the primary goal of continuous risk monitoring?
Identify and respond to new threats
Maintain employee training records
Reduce hardware costs
Increase software efficiency
✅ Correct Answer: Identify and respond to new threats
13. Which type of analysis is used to prioritize risks?
Qualitative and quantitative analysis
System performance analysis
Software code review
User feedback analysis
✅ Correct Answer: Qualitative and quantitative analysis
14. Which risk category includes natural disasters?
Environmental risk
Operational risk
Compliance risk
Strategic risk
✅ Correct Answer: Environmental risk
15. What is the purpose of risk appetite in risk management?
Define acceptable levels of risk
Document past security incidents
Track software licenses
Report financial data
✅ Correct Answer: Define acceptable levels of risk
16. Which control type is a disaster recovery plan (DRP) classified as?
Corrective
Preventive
Detective
Directive
✅ Correct Answer: Corrective
17. Which metric is essential for evaluating the effectiveness of risk management?
Key risk indicator (KRI)
Return on investment (ROI)
Service-level agreement (SLA)
Business impact score
✅ Correct Answer: Key risk indicator (KRI)
18. What is a key objective of information system control?
Ensure data integrity and availability
Increase software development speed
Monitor employee productivity
Reduce energy consumption
✅ Correct Answer: Ensure data integrity and availability
19. What is the first step in developing a risk management strategy?
124. What is the PRIMARY purpose of control documentation?
To provide evidence of operation
To train staff
To standardize processes
To satisfy auditors
✅ Correct Answer: To provide evidence of operation
125. Which of the following is MOST critical for access control?
Principle of least privilege
Complex passwords
Biometric authentication
Detailed logging
✅ Correct Answer: Principle of least privilege
126. What is the PRIMARY purpose of security awareness?
To modify employee behavior
To document compliance
To evaluate staff
To promote security team
✅ Correct Answer: To modify employee behavior
127. Which of the following is MOST important for physical security?
Layered defenses
Security guard count
Camera resolution
Fence height
✅ Correct Answer: Layered defenses
128. What is the PRIMARY purpose of encryption?
To protect data confidentiality
To improve performance
To reduce storage
To simplify access
✅ Correct Answer: To protect data confidentiality
129. Which of the following is MOST critical for network security?
Segmentation
Firewall brand
Monitoring tools
Logging details
✅ Correct Answer: Segmentation
130. What is the PRIMARY purpose of vulnerability management?
To reduce attack surface
To document weaknesses
To evaluate staff
To justify budgets
✅ Correct Answer: To reduce attack surface
131. Which of the following is MOST important for patch management?
Risk-based prioritization
Automated deployment
Comprehensive testing
Detailed documentation
✅ Correct Answer: Risk-based prioritization
132. What is the PRIMARY purpose of logging?
To support investigations
To improve performance
To reduce storage
To document configurations
✅ Correct Answer: To support investigations
133. Which of the following is MOST critical for backup management?
Regular testing
Storage capacity
Backup frequency
Media type
✅ Correct Answer: Regular testing
134. What is the PRIMARY purpose of disaster recovery planning?
To restore critical operations
To document procedures
To train staff
To justify budgets
✅ Correct Answer: To restore critical operations
135. Which of the following is MOST important for business continuity?
Critical process identification
Alternate site quality
Recovery team size
Exercise frequency
✅ Correct Answer: Critical process identification
136. What is the PRIMARY purpose of security assessments?
To evaluate control effectiveness
To find vulnerabilities
To test staff
To document configurations
✅ Correct Answer: To evaluate control effectiveness
137. Which of the following is MOST critical for security audits?
Independent perspective
Technical depth
Frequency
Report length
✅ Correct Answer: Independent perspective
138. What is the PRIMARY purpose of security certifications?
To validate security knowledge
To promote individuals
To satisfy regulators
To justify salaries
✅ Correct Answer: To validate security knowledge
139. Which of the following is MOST important for security training?
Role-specific content
Training frequency
Instructor qualifications
Facility quality
✅ Correct Answer: Role-specific content
140. What is the PRIMARY purpose of security policies?
To establish organizational expectations
To document procedures
To train staff
To satisfy auditors
✅ Correct Answer: To establish organizational expectations
141. Which of the following is MOST critical for security standards?
Implementation specificity
Comprehensiveness
Update frequency
Approval level
✅ Correct Answer: Implementation specificity
142. What is the PRIMARY purpose of security procedures?
To provide step-by-step guidance
To state requirements
To document configurations
To train staff
✅ Correct Answer: To provide step-by-step guidance
143. Which of the following is MOST important for security guidelines?
Flexibility in implementation
Technical detail
Comprehensiveness
Approval level
✅ Correct Answer: Flexibility in implementation
144. What is the PRIMARY purpose of security baselines?
To establish minimum requirements
To document configurations
To train staff
To satisfy auditors
✅ Correct Answer: To establish minimum requirements
145. Which of the following is MOST critical for security architecture?
Defense in depth
Standardization
Documentation
Tool integration
✅ Correct Answer: Defense in depth
146. What is the PRIMARY purpose of security models?
To guide control implementation
To document requirements
To train staff
To satisfy auditors
✅ Correct Answer: To guide control implementation
147. Which of the following is MOST important for security frameworks?
Alignment with business needs
Comprehensiveness
Industry acceptance
Regulatory approval
✅ Correct Answer: Alignment with business needs
148. What is the PRIMARY purpose of security principles?
To guide decision making
To document requirements
To train staff
To satisfy auditors
✅ Correct Answer: To guide decision making
149. Which of the following is MOST critical for security governance?
Executive support
Detailed policies
Large staff
Advanced tools
✅ Correct Answer: Executive support
150. What is the PRIMARY purpose of security committees?
To provide cross-functional oversight
To make technical decisions
To manage projects
To review incidents
✅ Correct Answer: To provide cross-functional oversight
The Isaca Crisc Certified Risk Information Systems Control certification is a globally recognized credential for IT professionals.
This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.
Want more practice? Check out our other mock exams: