CRISC Exam Question 126
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Correct Answer: D
New regulatory requirements impacting IT are those that impose new obligations, restrictions, or standards on how an organization uses, manages, or secures its IT systems, data, or services1. Examples of such regulations include the GDPR, the CCPA, the HIPAA, or the PCI-DSS2. New regulatory requirements impacting IT can pose significant challenges and risks for an organization, such as:
Compliance costs and efforts, such as updating policies, procedures, and systems, training staff, or hiring experts Noncompliance penalties and consequences, such as fines, lawsuits, sanctions, or reputational damages Operational disruptions or inefficiencies, such as system changes, data migrations, or service interruptions Competitive disadvantages or opportunities, such as losing or gaining customers, partners, or markets3 The first step that should be done when a company is made aware of new regulatory requirements impacting IT is to review the risk tolerance and appetite. Risk tolerance is the acceptable level of variation that an organization is willing to accept around its risk appetite. Risk appetite is the amount and type of risk that an organization is willing to take in order to meet its strategic objectives. By reviewing the risk tolerance and appetite, the company can:
Establish a clear and consistent understanding of the organization's goals, values, and expectations regarding the new regulatory requirements impacting IT Assess the current and potential impacts of the new regulatory requirements impacting IT on the organization' s performance, operations, or assets Determine the level of risk exposure and acceptance that the organization is comfortable with, and identify the risk thresholds or limits that should not be exceeded Align the risk management strategies and actions with the organization's risk tolerance and appetite, and prioritize the most critical and urgent risks to be addressed Communicate and report the risk tolerance and appetite to the stakeholders and regulators, and ensure transparency and accountability References = Regulating emerging technology | Deloitte Insights, Ten Key Regulatory Challenges of 2024 - kpmg.com, The Risks of Non-Compliance with Data Protection Laws, [Risk Tolerance - COSO], [Risk Appetite - COSO], [Risk Appetite and Tolerance - IRM]
Compliance costs and efforts, such as updating policies, procedures, and systems, training staff, or hiring experts Noncompliance penalties and consequences, such as fines, lawsuits, sanctions, or reputational damages Operational disruptions or inefficiencies, such as system changes, data migrations, or service interruptions Competitive disadvantages or opportunities, such as losing or gaining customers, partners, or markets3 The first step that should be done when a company is made aware of new regulatory requirements impacting IT is to review the risk tolerance and appetite. Risk tolerance is the acceptable level of variation that an organization is willing to accept around its risk appetite. Risk appetite is the amount and type of risk that an organization is willing to take in order to meet its strategic objectives. By reviewing the risk tolerance and appetite, the company can:
Establish a clear and consistent understanding of the organization's goals, values, and expectations regarding the new regulatory requirements impacting IT Assess the current and potential impacts of the new regulatory requirements impacting IT on the organization' s performance, operations, or assets Determine the level of risk exposure and acceptance that the organization is comfortable with, and identify the risk thresholds or limits that should not be exceeded Align the risk management strategies and actions with the organization's risk tolerance and appetite, and prioritize the most critical and urgent risks to be addressed Communicate and report the risk tolerance and appetite to the stakeholders and regulators, and ensure transparency and accountability References = Regulating emerging technology | Deloitte Insights, Ten Key Regulatory Challenges of 2024 - kpmg.com, The Risks of Non-Compliance with Data Protection Laws, [Risk Tolerance - COSO], [Risk Appetite - COSO], [Risk Appetite and Tolerance - IRM]
CRISC Exam Question 127
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?
Correct Answer: B
A bring your own device (BYOD) initiative allows employees to use their personal devices, such as smartphones, tablets, or laptops, for work purposes. This can provide benefits such as increased productivity, flexibility, and employee satisfaction. However, it also introduces significant risks, such as data loss, data leakage, malware infection, unauthorized access, and compliance violations. Among these risks, data loss is of greatest concern for an organization, as it can have severe consequences, such as reputational damage, legal liability, financial loss, and competitive disadvantage. Data loss can occur due to various reasons, such as device theft, loss, damage, or disposal, accidental deletion, unauthorized transfer, or malicious attack.
Therefore, an organization considering the adoption of a BYOD initiative should implement appropriate controls, such as encryption, authentication, remote wipe, backup, and data classification, to protect the data stored or accessed on the personal devices. References = Bring Your Own Device (BYOD) Policy: What You Need to Know, BYOD Risks: What You Need to Know, BYOD Security: 8 Risks and How to Mitigate Them
Therefore, an organization considering the adoption of a BYOD initiative should implement appropriate controls, such as encryption, authentication, remote wipe, backup, and data classification, to protect the data stored or accessed on the personal devices. References = Bring Your Own Device (BYOD) Policy: What You Need to Know, BYOD Risks: What You Need to Know, BYOD Security: 8 Risks and How to Mitigate Them
CRISC Exam Question 128
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Correct Answer: D
A contingency plan is a set of actions and procedures that aim to ensure the continuity of critical business functions in the event of a disruption or disaster. An alternate processing site is a location where the organization can resume its information systems operations in case the primary site is unavailable or damaged. The most important consideration when establishing a contingency plan and an alternate processing site for a company located on a moderate earthquake fault is to ensure that the alternative site does not reside on the same fault, no matter how far apart they are. This is because an earthquake can affect a large area along the fault line, and potentially damage both the primary and the alternative site, rendering them unusable. By choosing an alternative site that is not on the same fault, the company can reduce the risk of losing both sites, and increase the likelihood of restoring its operations quickly and effectively. The other options are not as important as the alternative site location, because they do not address the main threat of an earthquake, but rather focus on specific or partial aspects of the contingency plan, as explained below:
A: The alternative site is a hot site with equipment ready to resume processing immediately is a consideration that relates to the availability and readiness of the alternative site, but it does not ensure that the site is safe and secure from an earthquake. A hot site is a type of alternative site that has the necessary hardware, software, and network components to resume the information systems operations with minimal or no downtime. However, if the hot site is on the same fault as the primary site, it may not be accessible or functional after an earthquake, and the company may lose both sites and the data stored on them.
B: The contingency plan provides for backup media to be taken to the alternative site is a consideration that relates to the integrity and recoverability of the data, but it does not ensure that the site is safe and secure from an earthquake. Backup media are devices or systems that store copies of the data and information that are essential for the organization's operations. Taking backup media to the alternative site can help the company to restore its data and resume its operations in case the primary site is damaged or destroyed. However, if the alternative site is on the same fault as the primary site, it may not be accessible or functional after an earthquake, and the company may lose both sites and the backup media.
C: The contingency plan for high priority applications does not involve a shared cold site is a consideration that relates to the performance and reliability of the alternative site, but it does not ensure that the site is safe and secure from an earthquake. A shared cold site is a type of alternative site that has the necessary space and infrastructure to accommodate the information systems operations, but does not have the hardware, software, or network components installed. A shared cold site is shared by multiple organizations, and may not be available or suitable for the company's high priority applications, which require more resources and customization. However, if the alternative site is on the same fault as the primary site, it may not be accessible or functional after an earthquake, and the company may lose both sites and the ability to resume its high priority applications. References = Risk and Information Systems Control Study Manual, Chapter 4, Section
4.2.1, page 115. How to conduct a contingency planning process - IFRC, CP-4(2): Alternate Processing Site - CSF Tools - Identity Digital, Information System Contingency Planning Guidance - ISACA
A: The alternative site is a hot site with equipment ready to resume processing immediately is a consideration that relates to the availability and readiness of the alternative site, but it does not ensure that the site is safe and secure from an earthquake. A hot site is a type of alternative site that has the necessary hardware, software, and network components to resume the information systems operations with minimal or no downtime. However, if the hot site is on the same fault as the primary site, it may not be accessible or functional after an earthquake, and the company may lose both sites and the data stored on them.
B: The contingency plan provides for backup media to be taken to the alternative site is a consideration that relates to the integrity and recoverability of the data, but it does not ensure that the site is safe and secure from an earthquake. Backup media are devices or systems that store copies of the data and information that are essential for the organization's operations. Taking backup media to the alternative site can help the company to restore its data and resume its operations in case the primary site is damaged or destroyed. However, if the alternative site is on the same fault as the primary site, it may not be accessible or functional after an earthquake, and the company may lose both sites and the backup media.
C: The contingency plan for high priority applications does not involve a shared cold site is a consideration that relates to the performance and reliability of the alternative site, but it does not ensure that the site is safe and secure from an earthquake. A shared cold site is a type of alternative site that has the necessary space and infrastructure to accommodate the information systems operations, but does not have the hardware, software, or network components installed. A shared cold site is shared by multiple organizations, and may not be available or suitable for the company's high priority applications, which require more resources and customization. However, if the alternative site is on the same fault as the primary site, it may not be accessible or functional after an earthquake, and the company may lose both sites and the ability to resume its high priority applications. References = Risk and Information Systems Control Study Manual, Chapter 4, Section
4.2.1, page 115. How to conduct a contingency planning process - IFRC, CP-4(2): Alternate Processing Site - CSF Tools - Identity Digital, Information System Contingency Planning Guidance - ISACA
CRISC Exam Question 129
Which of the following should be an element of the risk appetite of an organization?
Correct Answer: B
Risk appetite is the amount and type of risk that an organization is willing to accept in pursuit of its objectives. One of the elements of risk appetite is the enterprise's capacity to absorb loss, which is the maximum amount of loss that an organization can withstand without jeopardizing its existence or strategic objectives. The effectiveness of compensating controls, the residual risk affected by preventive controls, and the amount of inherent risk considered appropriate are not elements of risk appetite, but rather factors that influence the risk assessment and response processes. References = [CRISC Review Manual (Digital Version)], page 41; CRISC Review Questions, Answers & Explanations Database, question 196.
CRISC Exam Question 130
Which of the following BEST protects organizational data within a production cloud environment?
Correct Answer: A
Data encryption is the best method to protect organizational data within a production cloud environment, as it ensures the confidentiality, integrity, and availability of the data. Data encryption is the process of transforming data into an unreadable format using a secret key or algorithm, so that only authorized parties can access and decrypt the data. Data encryption can protect data at rest (stored in the cloud) and data in transit (transferred over the network) from unauthorized access, modification, or deletion by malicious actors or accidental errors. Data encryption can also help organizations comply with legal, regulatory, and contractual requirements for data protection and privacy, such as GDPR, CCPA, and PCI DSS.
References:
*The Complexity Conundrum: Simplifying Data Security1
*Practical Data Security and Privacy for GDPR and CCPA2
References:
*The Complexity Conundrum: Simplifying Data Security1
*Practical Data Security and Privacy for GDPR and CCPA2
- Other Version
- 2378ISACA.CRISC.v2025-09-26.q726
- 2623ISACA.CRISC.v2025-08-27.q675
- 3952ISACA.CRISC.v2025-01-04.q999
- 1712ISACA.CRISC.v2024-06-13.q683
- 2316ISACA.CRISC.v2024-04-02.q999
- 2917ISACA.CRISC.v2023-07-10.q544
- 5687ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5562ISACA.CRISC.v2022-02-22.q349
- 5834ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 119SAP.C_BCBAI_2509.v2026-01-15.q13
- 209DAMA.DMF-1220.v2026-01-15.q271
- 138SAP.C_SIGDA_2403.v2026-01-15.q66
- 206ISACA.CRISC.v2026-01-15.q649
- 128PaloAltoNetworks.NetSec-Pro.v2026-01-15.q26
- 170Splunk.SPLK-1002.v2026-01-14.q121
- 170EMC.NCP-AII.v2026-01-14.q144
- 164Microsoft.AZ-800.v2026-01-13.q144
- 176Microsoft.MS-102.v2026-01-13.q258
- 121HP.HPE2-E84.v2026-01-13.q17
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2026-01-15.q649 Practice Test
