CRISC Exam Question 111
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Correct Answer: B
Business process owners are the most important to include in the assessment of existing IT risk scenarios, as they have the authority and responsibility to manage the business processes and their associated risks and controls, and to provide the business perspective and requirements for the IT risk scenarios. Technology subject matter experts, business users of IT systems, and risk management consultants are not the most important to include, as they may have different roles and responsibilities related to the technical, operational, or advisory aspects of IT risk scenarios, respectively, but they do not own the business processes or the IT risk scenarios. References = CRISC Review Manual, 7th Edition, page 101.
CRISC Exam Question 112
The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:
Correct Answer: A
User accounts provisioning is the process of creating, managing, and modifying user accounts within a system or an application, based on the user's roles, responsibilities, and requirements. User accounts provisioning is an essential part of identity and access management (IAM), which aims to ensure the confidentiality, integrity, and availability of the system or the application, and the information or resources that it handles or supports1.
The best key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of accounts without documented approval, because it can help to measure how well the organization follows the policies, standards, and procedures for user accounts provisioning, and how effectively the organization controls and audits the user accounts provisioning activities. The percentage of accounts without documented approval can indicate:
* The level of compliance and accountability of the user accounts provisioning process, and the extent to which the user accounts provisioning requests and actions are authorized and verified by the appropriate parties, such as managers, IT staff, or security officers
* The level of risk and exposure of the user accounts provisioning process, and the likelihood and impact of unauthorized or inappropriate user accounts provisioning, such as granting excessive or unnecessary access privileges, creating duplicate or fraudulent accounts, or violating legal or regulatory requirements
* The level of quality and efficiency of the user accounts provisioning process, and the ability and capacity of the organization to manage and maintain the user accounts provisioning records and documents, such as forms, logs, or reports23 The other options are not the best KPIs for monitoring adherence to an organization's user accounts provisioning practices, but rather some of the factors or outcomes of it. User accounts with default passwords are user accounts that have not changed their passwords from the initial or default values that are assigned by the system or the application. User accounts with default passwords are a factor that can increase the risk of unauthorized or malicious access to the system or the application, as the default passwords may be easily guessed or compromised by attackers. Active accounts belonging to former personnel are user accounts that have not been deactivated or deleted after the users have left the organization. Active accounts belonging to former personnel are an outcome of ineffective or inefficient user accounts deprovisioning, which is the process of revoking or removing the user accounts and access privileges when they are no longer needed or valid. Accounts with dormant activity are user accounts that have not been used or accessed for a long period of time. Accounts with dormant activity are an outcome of poor or inconsistent user accounts management, which is the process of updating or modifying the user accounts and access privileges according to the changes or needs of the users or the organization4. References =
* User Provisioning for SaaS Apps: Top 10 Best Practices | Resmo
* Top Identity and Access Management Metrics
* KPI-driven approach to Identity & Access Management - Elimity
* [CRISC Review Manual, 7th Edition]
The best key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of accounts without documented approval, because it can help to measure how well the organization follows the policies, standards, and procedures for user accounts provisioning, and how effectively the organization controls and audits the user accounts provisioning activities. The percentage of accounts without documented approval can indicate:
* The level of compliance and accountability of the user accounts provisioning process, and the extent to which the user accounts provisioning requests and actions are authorized and verified by the appropriate parties, such as managers, IT staff, or security officers
* The level of risk and exposure of the user accounts provisioning process, and the likelihood and impact of unauthorized or inappropriate user accounts provisioning, such as granting excessive or unnecessary access privileges, creating duplicate or fraudulent accounts, or violating legal or regulatory requirements
* The level of quality and efficiency of the user accounts provisioning process, and the ability and capacity of the organization to manage and maintain the user accounts provisioning records and documents, such as forms, logs, or reports23 The other options are not the best KPIs for monitoring adherence to an organization's user accounts provisioning practices, but rather some of the factors or outcomes of it. User accounts with default passwords are user accounts that have not changed their passwords from the initial or default values that are assigned by the system or the application. User accounts with default passwords are a factor that can increase the risk of unauthorized or malicious access to the system or the application, as the default passwords may be easily guessed or compromised by attackers. Active accounts belonging to former personnel are user accounts that have not been deactivated or deleted after the users have left the organization. Active accounts belonging to former personnel are an outcome of ineffective or inefficient user accounts deprovisioning, which is the process of revoking or removing the user accounts and access privileges when they are no longer needed or valid. Accounts with dormant activity are user accounts that have not been used or accessed for a long period of time. Accounts with dormant activity are an outcome of poor or inconsistent user accounts management, which is the process of updating or modifying the user accounts and access privileges according to the changes or needs of the users or the organization4. References =
* User Provisioning for SaaS Apps: Top 10 Best Practices | Resmo
* Top Identity and Access Management Metrics
* KPI-driven approach to Identity & Access Management - Elimity
* [CRISC Review Manual, 7th Edition]
CRISC Exam Question 113
Which of the following is the BEST method for identifying vulnerabilities?
Correct Answer: B
The best method for identifying vulnerabilities is periodic network scanning. Network scanning is a process of scanning and probing the network devices, systems, and applications to discover and analyze their security weaknesses, such as configuration errors, outdated software, or open ports. Network scanning can help to identify the vulnerabilities that could be exploited by attackers to gain unauthorized access, compromise data, or disrupt services. Periodic network scanning is the best method, because it can provide a regular and comprehensive view of the network security posture, and it can detect and address the new or emerging vulnerabilities in a timely manner. Periodic network scanning can also help to comply with the legal and regulatory requirements and standards for network security, such as the ISO/IEC 27001, the NIST SP 800-53, or the PCI DSS123. The other options are not the best method, although they may be useful or complementary to periodic network scanning. Batch job failure monitoring is a process of monitoring and reporting the failures or errors that occur during the execution of batch jobs, such as data processing, backup, or synchronization. Batch job failure monitoring can help to identify the operational or technical issues that affect the performance or availability of the network services, but it does not directly identify the security vulnerabilities or the potential threats. Annual penetration testing is a process of simulating a real-world attack on the network devices, systems, and applications to evaluate their security defenses and resilience.
Penetration testing can help to identify and exploit the vulnerabilities that could be used by attackers to compromise the network security, and to provide recommendations for improvement. However, annual penetration testing is not the best method, because it is not frequent or consistent enough to keep up with the changing and evolving network security landscape, and it may not cover all the network components or scenarios. Risk assessments are a process of identifying, analyzing, and evaluating the risks associated with the network devices, systems, and applications. Risk assessments can help to estimate the probability and impact of the vulnerabilities and the threats, and to prioritize and respond to the risks accordingly. However, risk assessments are not the same as or a substitute for vulnerability identification, as they rely on the vulnerability information as an input, rather than an output. References = Vulnerability Testing: Methods, Tools, and 10 Best Practices, ISO/IEC 27001 Information Security Management, NIST SP 800-53 Rev. 5
Penetration testing can help to identify and exploit the vulnerabilities that could be used by attackers to compromise the network security, and to provide recommendations for improvement. However, annual penetration testing is not the best method, because it is not frequent or consistent enough to keep up with the changing and evolving network security landscape, and it may not cover all the network components or scenarios. Risk assessments are a process of identifying, analyzing, and evaluating the risks associated with the network devices, systems, and applications. Risk assessments can help to estimate the probability and impact of the vulnerabilities and the threats, and to prioritize and respond to the risks accordingly. However, risk assessments are not the same as or a substitute for vulnerability identification, as they rely on the vulnerability information as an input, rather than an output. References = Vulnerability Testing: Methods, Tools, and 10 Best Practices, ISO/IEC 27001 Information Security Management, NIST SP 800-53 Rev. 5
CRISC Exam Question 114
Recovery the objectives (RTOs) should be based on
Correct Answer: C
Recovery time objectives (RTOs) are the acceptable timeframes within which business processes must be restored after a disruption. RTOs should be based on the maximum tolerable downtime (MTD), which is the longest time that a business process can be inoperable without causing irreparable harm to the organization.
The other options are not directly related to RTOs, as they refer to the amount of data loss or corruption that can be tolerated, not the time to restore the business processes. References = Risk and Information Systems Control Study Manual, Chapter 4: Risk and Control Monitoring and Reporting, Section 4.3: Key Risk Indicators, page 197.
The other options are not directly related to RTOs, as they refer to the amount of data loss or corruption that can be tolerated, not the time to restore the business processes. References = Risk and Information Systems Control Study Manual, Chapter 4: Risk and Control Monitoring and Reporting, Section 4.3: Key Risk Indicators, page 197.
CRISC Exam Question 115
Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?
Correct Answer: C
A business impact analysis (BIA) is the most helpful tool to management when determining the resources needed to mitigate a risk. A BIA is a process of identifying and evaluating the potential effects of disruptions or incidents on the critical functions and processes of an organization. A BIA helps to estimate the financial, operational, and reputational impacts of risks, as well as the recovery time objectives and recovery point objectives for each function and process. A BIA also helps to prioritize the functions and processes based on their importance and urgency, and to allocate the resources needed to protect, restore, and resume them. A BIA can provide valuable information to management for developing and implementing risk mitigation strategies and plans. The other options are not the most helpful tools to management when determining the resources needed to mitigate a risk, although they may be useful or complementary to the BIA. An internal audit is a process of evaluating and improving the effectiveness of the governance, risk management, and control systems of an organization, but it does not directly estimate the impacts of risks or the resources needed to mitigate them. A heat map is a graphical tool that displays the probability and impact of individual risks in a matrix format, but it does not provide the details of the functions and processes affected by the risks or the resources needed to protect them. A vulnerability report is a document that identifies and assesses the security weaknesses in an information system, but it does not measure the impacts of risks or the resources needed to mitigate them. References = Business Impact Analysis (BIA) | Ready.gov, Business Impact Analysis - ISACA, Business Impact Analysis - Risk Management from MindTools.com
- Other Version
- 3113ISACA.CRISC.v2025-01-04.q999
- 1408ISACA.CRISC.v2024-06-13.q683
- 2100ISACA.CRISC.v2024-04-02.q999
- 2695ISACA.CRISC.v2023-07-10.q544
- 5418ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5226ISACA.CRISC.v2022-02-22.q349
- 5062ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 290ISACA.CGEIT.v2025-09-19.q537
- 154Fortinet.FCP_FWF_AD-7.4.v2025-09-18.q62
- 154Scrum.SAFe-Practitioner.v2025-09-18.q63
- 146Workday.Workday-Prism-Analytics.v2025-09-17.q17
- 131Oracle.1Z0-1055-24.v2025-09-17.q28
- 129Oracle.1Z1-182.v2025-09-17.q32
- 245Nutanix.NCP-US-6.5.v2025-09-16.q73
- 265Oracle.1z0-071.v2025-09-16.q232
- 203Oracle.1Z1-922.v2025-09-16.q125
- 326CyberArk.PAM-CDE-RECERT.v2025-09-15.q100
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2025-08-27.q675 Practice Test