CRISC Exam Question 376
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
Correct Answer: D
The most effective way to reduce risk associated with an increase of online transactions on a retailer website is to implement website activity monitoring. Website activity monitoring can help to detect and prevent fraudulent transactions, unauthorized access, data breaches, and other cyber threats that may compromise the security and integrity of the website and its data. Scalable infrastructure, a hot backup site, and transaction limits are other possible ways to reduce risk, but they are not as effective as website activity monitoring. References = ISACA Certified in Risk and Information Systems Control (CRISC) Certification Exam Question and Answers, question 7; CRISC Review Manual, 6th Edition, page 202.
CRISC Exam Question 377
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
Correct Answer: C
Least privilege is the best way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement, because it limits the access and permissions of the individual to the minimum level that is required to perform their role or function, and prevents the individual from accessing or modifying the resources or data that are not relevant or authorized. An entitlement is a right or privilege that grants an individual the ability to access or use a resource or data, such as a file, a system, or an application. An unnecessary entitlement is an entitlement that is not needed or justified for the individual's role or function, and may pose a risk of unauthorized or inappropriate access or use of the resource or data. A potentially harmful action is an action that may cause harm or damage to the organization or its objectives, such as a data breach, a fraud, or a sabotage. Least privilege is the best way, as it helps to minimize the exposure and impact of the unnecessary entitlement, and to reduce the likelihood and severity of the potentially harmful action. Application monitoring, separation of duty, and nonrepudiation are all possible ways to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement, but they are not the best way, as they do not directly address the unnecessary entitlement, and may not prevent the potentially harmful action. References = Risk and Information Systems Control Study Manual, Chapter 5, Section 5.3.2, page 200
CRISC Exam Question 378
Optimized risk management is achieved when risk is reduced:
Correct Answer: B
Optimized risk management is achieved when risk is reduced to meet risk appetite, which is the amount and type of risk that an organization is willing to accept in pursuit of its objectives. Risk appetite reflects the strategic goals and priorities of the organization, as well as its risk culture and tolerance. Reducing risk with strategic initiatives, within resource availability, or below risk appetite are all possible approaches, but they do not necessarily optimize risk management, as they may result in over- or under-investment in risk mitigation, or misalignment with business objectives. References = Risk and Information Systems Control Study Manual, Chapter 2, Section 2.2.2, page 47
CRISC Exam Question 379
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
Correct Answer: A
Performing a post-implementation review is the best way to confirm whether appropriate automated controls are in place within a recently implemented system, as it helps to evaluate the effectiveness and efficiency of the system and its controls after they have been deployed and operationalized. A post-implementation review is a process of assessing and validating the system and its controls against the predefined criteria and objectives, such as functionality, performance, security, compliance, and user satisfaction. A post-implementation review can help to confirm whether appropriate automated controls are in place within a recently implemented system by providing the following benefits:
* It verifies that the system and its controls meet the design specifications and standards, and comply with the relevant laws, regulations, and contractual obligations.
* It identifies and measures the actual or potential benefits and value of the system and its controls, such as improved efficiency, reliability, or quality.
* It detects and analyzes any issues, gaps, or weaknesses in the system and its controls, such as errors, inconsistencies, or vulnerabilities.
* It provides recommendations and action plans to address the identified issues, gaps, or weaknesses, and to improve or enhance the system and its controls.
* It communicates and reports the results and findings of the review to the relevant stakeholders, and solicits their feedback and suggestions.
The other options are not the best ways to confirm whether appropriate automated controls are in place within a recently implemented system. Conducting user acceptance testing is an important step to ensure that the system and its controls meet the user requirements and expectations, but it is usually performed before the system is implemented and operationalized, and it may not cover all aspects of the system and its controls.
Reviewing the key performance indicators (KPIs) is a useful method to measure and monitor the performance of the system and its controls, but it may not provide a comprehensive or objective evaluation of the system and its controls. Interviewing process owners is a possible technique to collect and analyze information on the system and its controls, but it may not provide sufficient or reliable evidence to confirm the appropriateness of the system and its controls. References = Post-Implementation Review: The Key to a Successful Project, IT Risk Resources | ISACA, Post Implementation Review (PIR) - Project Management Knowledge
* It verifies that the system and its controls meet the design specifications and standards, and comply with the relevant laws, regulations, and contractual obligations.
* It identifies and measures the actual or potential benefits and value of the system and its controls, such as improved efficiency, reliability, or quality.
* It detects and analyzes any issues, gaps, or weaknesses in the system and its controls, such as errors, inconsistencies, or vulnerabilities.
* It provides recommendations and action plans to address the identified issues, gaps, or weaknesses, and to improve or enhance the system and its controls.
* It communicates and reports the results and findings of the review to the relevant stakeholders, and solicits their feedback and suggestions.
The other options are not the best ways to confirm whether appropriate automated controls are in place within a recently implemented system. Conducting user acceptance testing is an important step to ensure that the system and its controls meet the user requirements and expectations, but it is usually performed before the system is implemented and operationalized, and it may not cover all aspects of the system and its controls.
Reviewing the key performance indicators (KPIs) is a useful method to measure and monitor the performance of the system and its controls, but it may not provide a comprehensive or objective evaluation of the system and its controls. Interviewing process owners is a possible technique to collect and analyze information on the system and its controls, but it may not provide sufficient or reliable evidence to confirm the appropriateness of the system and its controls. References = Post-Implementation Review: The Key to a Successful Project, IT Risk Resources | ISACA, Post Implementation Review (PIR) - Project Management Knowledge
CRISC Exam Question 380
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
Correct Answer: B
IT risk scenarios are hypothetical situations that describe the sources, causes, and consequences of IT-related risks, and the potential impacts on the organization's objectives, performance, and value creation12.
A corporate risk register is a document that records and tracks the significant risks that the organization faces, and the responses and actions that are taken to address them34.
The greatest benefit of incorporating IT risk scenarios into the corporate risk register is that exposure is integrated into the organization's risk profile, which is a comprehensive and integrated representation of the risks that may affect the organization's objectives, performance, and value creation56.
Exposure is integrated into the organization's risk profile means that the organization has a complete and consistent view of the IT risk landscape, and the potential impacts andinterdependencies of IT risks on other types of risks, such as financial, operational, strategic, or reputational risks56.
Exposure is integrated into the organization's risk profile also means that the organization can make informed and balanced decisions on the risk responses and actions, and allocate the appropriate resources and priorities to the IT risk management and control processes56.
The other options are not the greatest benefit, but rather possible outcomes or consequences of incorporating IT risk scenarios into the corporate risk register. For example:
Corporate incident escalation protocols are established is an outcome of incorporating IT risk scenarios into the corporate risk register that indicates the organization has defined and implemented the procedures and mechanisms for reporting and resolving IT-related incidents,and for escalating them to the appropriate authorities or levels when necessary78. However, this outcome does not measure or reflect the exposure or the risk profile of the organization, which may depend on other factors such as the frequency, severity, or complexity of the incidents78.
Risk appetite cascades to business unit management is a consequence of incorporating IT risk scenarios into the corporate risk register that indicates the organization has communicated and aligned the risk appetite, which is the amount and type of risk that the organization is willing to accept or pursue, to the business unit management, who are responsible for executing the risk strategy and objectives at the operational level .
However, this consequence does not indicate or imply the exposure or the risk profile of the organization, which may vary depending on the context, environment, or stakeholder expectations .
The organization-wide control budget is expanded is an outcome of incorporating IT risk scenarios into the corporate risk register that indicates the organization has increased the amount of resources and funds that are allocated to the control processes, which are the procedures and activities that aim to ensure the effectiveness and efficiency of the organization's operations, the reliability of its information, and the compliance with its policies and regulations . However, this outcome does not affect or determine the exposure or the risk profile of the organization, which is independent of the control budget . References =
1: IT Risk Scenarios - Morland-Austin3
2: Risk Scenarios Toolkit, ISACA, 2019
3: Risk Register Template and Examples | Prioritize and Manage Risk1
4: Risk Register Examples for Cybersecurity Leaders4
5: Risk IT Framework, ISACA, 2009
6: IT Risk Management Framework, University of Toronto, 2017
7: Security Incident Reporting and Response, University of Toronto, 2017
8: Security Incident Reporting and Response, ISACA, 2019
Risk Appetite: Linking Strategy, Risk and Performance, ISACA, 2012
Risk Appetite and Tolerance, ISACA Journal, Volume 4, 2013
The Control Process | Principles of Management2
Control Management: What it is + Why It's Essential | Adobe Workfront5
A corporate risk register is a document that records and tracks the significant risks that the organization faces, and the responses and actions that are taken to address them34.
The greatest benefit of incorporating IT risk scenarios into the corporate risk register is that exposure is integrated into the organization's risk profile, which is a comprehensive and integrated representation of the risks that may affect the organization's objectives, performance, and value creation56.
Exposure is integrated into the organization's risk profile means that the organization has a complete and consistent view of the IT risk landscape, and the potential impacts andinterdependencies of IT risks on other types of risks, such as financial, operational, strategic, or reputational risks56.
Exposure is integrated into the organization's risk profile also means that the organization can make informed and balanced decisions on the risk responses and actions, and allocate the appropriate resources and priorities to the IT risk management and control processes56.
The other options are not the greatest benefit, but rather possible outcomes or consequences of incorporating IT risk scenarios into the corporate risk register. For example:
Corporate incident escalation protocols are established is an outcome of incorporating IT risk scenarios into the corporate risk register that indicates the organization has defined and implemented the procedures and mechanisms for reporting and resolving IT-related incidents,and for escalating them to the appropriate authorities or levels when necessary78. However, this outcome does not measure or reflect the exposure or the risk profile of the organization, which may depend on other factors such as the frequency, severity, or complexity of the incidents78.
Risk appetite cascades to business unit management is a consequence of incorporating IT risk scenarios into the corporate risk register that indicates the organization has communicated and aligned the risk appetite, which is the amount and type of risk that the organization is willing to accept or pursue, to the business unit management, who are responsible for executing the risk strategy and objectives at the operational level .
However, this consequence does not indicate or imply the exposure or the risk profile of the organization, which may vary depending on the context, environment, or stakeholder expectations .
The organization-wide control budget is expanded is an outcome of incorporating IT risk scenarios into the corporate risk register that indicates the organization has increased the amount of resources and funds that are allocated to the control processes, which are the procedures and activities that aim to ensure the effectiveness and efficiency of the organization's operations, the reliability of its information, and the compliance with its policies and regulations . However, this outcome does not affect or determine the exposure or the risk profile of the organization, which is independent of the control budget . References =
1: IT Risk Scenarios - Morland-Austin3
2: Risk Scenarios Toolkit, ISACA, 2019
3: Risk Register Template and Examples | Prioritize and Manage Risk1
4: Risk Register Examples for Cybersecurity Leaders4
5: Risk IT Framework, ISACA, 2009
6: IT Risk Management Framework, University of Toronto, 2017
7: Security Incident Reporting and Response, University of Toronto, 2017
8: Security Incident Reporting and Response, ISACA, 2019
Risk Appetite: Linking Strategy, Risk and Performance, ISACA, 2012
Risk Appetite and Tolerance, ISACA Journal, Volume 4, 2013
The Control Process | Principles of Management2
Control Management: What it is + Why It's Essential | Adobe Workfront5
- Other Version
- 2378ISACA.CRISC.v2025-09-26.q726
- 2628ISACA.CRISC.v2025-08-27.q675
- 3952ISACA.CRISC.v2025-01-04.q999
- 1713ISACA.CRISC.v2024-06-13.q683
- 2316ISACA.CRISC.v2024-04-02.q999
- 2919ISACA.CRISC.v2023-07-10.q544
- 5687ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5562ISACA.CRISC.v2022-02-22.q349
- 5835ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 116Cisco.400-007.v2026-01-16.q194
- 111ABPMP.CBPA.v2026-01-16.q55
- 106Huawei.H19-301_V3.0.v2026-01-16.q84
- 107ACAMS.CAMS-CN.v2026-01-16.q392
- 119SAP.C_BCBAI_2509.v2026-01-15.q13
- 215DAMA.DMF-1220.v2026-01-15.q271
- 138SAP.C_SIGDA_2403.v2026-01-15.q66
- 298ISACA.CRISC.v2026-01-15.q649
- 128PaloAltoNetworks.NetSec-Pro.v2026-01-15.q26
- 171Splunk.SPLK-1002.v2026-01-14.q121
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2026-01-15.q649 Practice Test
