CRISC Exam Question 66
An upward trend in which of the following metrics should be of MOST concern?
Correct Answer: C
A security policy exception is a deviation from the established security policy that is granted to an individual or a group for a specific purpose or period of time. A security policy exception may be necessary when the security policy is too restrictive, outdated, or incompatible with the business requirements or objectives.
However, a security policy exception also introduces a risk to the organization, as it may weaken the security posture, expose the organization to threats or vulnerabilities, or violate the compliance or regulatory obligations. Therefore, an upward trend in the number of security policy exceptions approved should be of most concern, as it indicates that the security policy is not effective or aligned with the organization's needs and goals, and that the organization is accepting more risk than desired. The other options are not as concerning as the number of security policy exceptions approved, because they do not imply a direct or immediate risk to the organization, but rather reflect the normal or expected activities of the security management process, as explained below:
* A. Number of business change management requests is a metric that measures the volume and frequency of the requests to modify the business processes, systems, or functions. An upward trend in this metric may indicate that the organization is undergoing a transformation, innovation, or improvement, which may have positive or negative impacts on the organization's performance and security. However, this metric does not necessarily imply a risk to the organization, as the change management requests may be properly assessed, approved, and implemented, following the established change management procedures and controls.
* B. Number of revisions to security policy is a metric that measures the amount and extent of the changes made to the security policy over time. An upward trend in this metric may indicate that the security policy is being updated, refined, or enhanced, which may improve or maintain the security posture and compliance of the organization. However, this metric does not necessarily imply a risk to the organization, as the revisions to the security policy may be based on the best practices, standards, and expectations for security management, and may be communicated and enforced effectively across the organization.
* D. Number of changes to firewall rules is a metric that measures the number and type of the modifications made to the firewall configuration, which controls the incoming and outgoing network traffic based on predefined rules. An upward trend in this metric may indicate that the firewall is being adjusted, optimized, or customized, which may increase or decrease the firewall performance and security. However, this metric does not necessarily imply a risk to the organization, as the changes to the firewall rules may be justified, authorized, and validated, following the established firewall management procedures and controls. References = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.2.1, page 115. Security Policy Exceptions: What Are They and How to Manage Them, Security Policy Exceptions: How to Handle Them in a Secure Manner, Security Policy Exceptions: A Necessary Evil?
However, a security policy exception also introduces a risk to the organization, as it may weaken the security posture, expose the organization to threats or vulnerabilities, or violate the compliance or regulatory obligations. Therefore, an upward trend in the number of security policy exceptions approved should be of most concern, as it indicates that the security policy is not effective or aligned with the organization's needs and goals, and that the organization is accepting more risk than desired. The other options are not as concerning as the number of security policy exceptions approved, because they do not imply a direct or immediate risk to the organization, but rather reflect the normal or expected activities of the security management process, as explained below:
* A. Number of business change management requests is a metric that measures the volume and frequency of the requests to modify the business processes, systems, or functions. An upward trend in this metric may indicate that the organization is undergoing a transformation, innovation, or improvement, which may have positive or negative impacts on the organization's performance and security. However, this metric does not necessarily imply a risk to the organization, as the change management requests may be properly assessed, approved, and implemented, following the established change management procedures and controls.
* B. Number of revisions to security policy is a metric that measures the amount and extent of the changes made to the security policy over time. An upward trend in this metric may indicate that the security policy is being updated, refined, or enhanced, which may improve or maintain the security posture and compliance of the organization. However, this metric does not necessarily imply a risk to the organization, as the revisions to the security policy may be based on the best practices, standards, and expectations for security management, and may be communicated and enforced effectively across the organization.
* D. Number of changes to firewall rules is a metric that measures the number and type of the modifications made to the firewall configuration, which controls the incoming and outgoing network traffic based on predefined rules. An upward trend in this metric may indicate that the firewall is being adjusted, optimized, or customized, which may increase or decrease the firewall performance and security. However, this metric does not necessarily imply a risk to the organization, as the changes to the firewall rules may be justified, authorized, and validated, following the established firewall management procedures and controls. References = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.2.1, page 115. Security Policy Exceptions: What Are They and How to Manage Them, Security Policy Exceptions: How to Handle Them in a Secure Manner, Security Policy Exceptions: A Necessary Evil?
CRISC Exam Question 67
Which of the following BEST indicates the condition of a risk management program?
Correct Answer: D
The best indicator of the condition of a risk management program is the amount of residual risk. Residual risk is the risk that remains after the implementation of risk responses. Residual risk reflects the effectiveness and efficiency of the risk management program in reducing the risk exposure to an acceptable level, and in aligning the risk profile with the risk appetite and tolerance of the enterprise. A low amount of residual risk indicates that the risk management program is performing well, and that the controls are adequate and appropriate. A high amount of residual risk indicates that the risk management program is not functioning properly, and that the controls are insufficient or ineffective. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 1, Section 1.2.2, page 191
CRISC Exam Question 68
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
Correct Answer: D
Reviewing the impact to the IT environment is the most important task for a risk practitioner to perform after the announcement of a new IT regulatory requirement, because it helps to identify and assess the gaps and risks that the new requirement may introduce or affect. A regulatory requirement is a rule or standard that an organization must comply with to meet the expectations of a regulator, such as a government agency or an industry body. A new regulatory requirement may impose new obligations, restrictions, or expectations on the organization, especially on its IT environment, which supports the business processes and functions.
Therefore, reviewing the impact to the IT environment is the first step to understand the implications and implications of the new requirement, and to plan the appropriate actions to achieve compliance. Preparing an IT risk mitigation strategy, escalating to senior management, and performing a cost-benefit analysis are all important tasks to perform after reviewing the impact to the IT environment, but they are not the most important task, as they depend on the results of the impact review. References = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.3.1, page 153
Therefore, reviewing the impact to the IT environment is the first step to understand the implications and implications of the new requirement, and to plan the appropriate actions to achieve compliance. Preparing an IT risk mitigation strategy, escalating to senior management, and performing a cost-benefit analysis are all important tasks to perform after reviewing the impact to the IT environment, but they are not the most important task, as they depend on the results of the impact review. References = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.3.1, page 153
CRISC Exam Question 69
Which of the following is the BEST way to determine software license compliance?
Correct Answer: B
According to the 6 Best Practices to Ensure Software License Compliance article, the best way to determine software license compliance is to conduct regular internal compliance audits. These self-assessments can be done with the help of software license management companies. The goal is to see where compliance issues lie and to take corrective actions before they become serious problems. Periodic compliance reviews can help to avoid fines, penalties, lawsuits, and reputational damage that may result from software license violations.
They can also help to optimize software spending and utilization, and to identify any gaps or opportunities for improvement in the software license management process. References = 6 Best Practices to Ensure Software License Compliance
They can also help to optimize software spending and utilization, and to identify any gaps or opportunities for improvement in the software license management process. References = 6 Best Practices to Ensure Software License Compliance
CRISC Exam Question 70
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Correct Answer: A
A policy exception is a deviation from the established policies, standards, or procedures of the enterprise, such as the information security policy. A policy exception may be granted by the management when there is a valid business reason or justification for the deviation, and when the risk associated with the deviation is acceptable or mitigated. The best course of action when a business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls is to obtain management approval for policy exception. This will ensure that the business unit is aware of the implications and consequences of the policy exception, and that the management agrees with the risk acceptance and approves the policy exception. The other options are not the best course of action, as they involve different risk response strategies or outcomes:
* Develop an improved password software routine means that the business unit modifies or enhances the password controls of the software package, such as by increasing the password length, complexity, or expiration. This may not be a feasible or effective way to address the risk of weak password controls, as it may violate the terms and conditions of the software vendor, or may not be compatible or consistent with the software package.
* Select another application with strong password controls means that the business unit replaces the software package with another application that has better password controls, such as by using encryption, authentication, or authorization. This may not be a desirable or efficient way to address the risk of weak password controls, as it may incur additional costs, delays, or complexities, or may not meet the business requirements or expectations of the business unit.
* Continue the implementation with no changes means that the business unit proceeds with the software package without any modifications or improvements to the password controls, or without any approval or documentation of the policy exception. This may not be a responsible or ethical way to address the risk of weak password controls, as it may expose the enterprise to legal, financial, or reputational risks, or may compromise the security or compliance of the enterprise. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 3, Section 3.4.1.1, pp. 121-122.
* Develop an improved password software routine means that the business unit modifies or enhances the password controls of the software package, such as by increasing the password length, complexity, or expiration. This may not be a feasible or effective way to address the risk of weak password controls, as it may violate the terms and conditions of the software vendor, or may not be compatible or consistent with the software package.
* Select another application with strong password controls means that the business unit replaces the software package with another application that has better password controls, such as by using encryption, authentication, or authorization. This may not be a desirable or efficient way to address the risk of weak password controls, as it may incur additional costs, delays, or complexities, or may not meet the business requirements or expectations of the business unit.
* Continue the implementation with no changes means that the business unit proceeds with the software package without any modifications or improvements to the password controls, or without any approval or documentation of the policy exception. This may not be a responsible or ethical way to address the risk of weak password controls, as it may expose the enterprise to legal, financial, or reputational risks, or may compromise the security or compliance of the enterprise. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 3, Section 3.4.1.1, pp. 121-122.
- Other Version
- 3096ISACA.CRISC.v2025-01-04.q999
- 1397ISACA.CRISC.v2024-06-13.q683
- 2082ISACA.CRISC.v2024-04-02.q999
- 2677ISACA.CRISC.v2023-07-10.q544
- 5400ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5208ISACA.CRISC.v2022-02-22.q349
- 5044ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 257ISACA.CGEIT.v2025-09-19.q537
- 153Fortinet.FCP_FWF_AD-7.4.v2025-09-18.q62
- 154Scrum.SAFe-Practitioner.v2025-09-18.q63
- 146Workday.Workday-Prism-Analytics.v2025-09-17.q17
- 131Oracle.1Z0-1055-24.v2025-09-17.q28
- 129Oracle.1Z1-182.v2025-09-17.q32
- 243Nutanix.NCP-US-6.5.v2025-09-16.q73
- 264Oracle.1z0-071.v2025-09-16.q232
- 203Oracle.1Z1-922.v2025-09-16.q125
- 324CyberArk.PAM-CDE-RECERT.v2025-09-15.q100
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2025-08-27.q675 Practice Test