CRISC Exam Question 401
Which of the following would be MOST beneficial as a key risk indicator (KRI)?
Correct Answer: B
A key risk indicator (KRI) is a metric used to measure and monitor the level of risk associated with a particular process, activity, or system within an organization1. KRIs are typically used in risk management to provide early warning signs of potential risks and to help organizations take proactive steps to mitigate those risks. KRIs are designed to be quantitative and measurable, allowing organizations to track changes in risk levels over time and to identify trends and patterns that may indicate an increased likelihood of risk. A negative security return on investment (ROI) would be most beneficial as a KRI, as it would indicate that the organization is spending more on security than the value it is generating or protecting. A negative security ROI would suggest that the organization is either over-investing in security, under-utilizing its security assets, or facing significant security threats or incidents that erode its security value. A negative security ROI would alert the organization to review its security strategy, budget, and performance, and to adjust them accordingly to optimize its security ROI and reduce its risk exposure2. Current capital allocation reserves are not the most beneficial as a KRI, as they do not directly measure the level of risk associated with a particular process, activity, or system. Capital allocation reserves are the amount of capital that an organization sets aside to cover potential losses or liabilities arising from its activities. Capital allocation reserves may reflect the organization's overall risk appetite and tolerance, but they do not provide specific information on the sources, types, or impacts of risks that the organization faces3. Project cost variances are not the most beneficial as a KRI, as they do not directly measure the level of risk associated with a particular process, activity, or system.
Project cost variances are the differences between the actual and planned costs of a project. Project cost variances may indicate the performance or efficiency of a project, but they do not provide specific information on the risks that may affect the project's objectives, scope, quality, or schedule4. Annualized loss projections are not the most beneficial as a KRI, as they do not directly measure the level of risk associated with a particular process, activity, or system. Annualized loss projections are the estimates of the potential losses that an organization may incur in a year due to various risk events. Annualized loss projections may help the organization to plan and budget for its risk management activities, but they do not provide specific information on the likelihood, frequency, or severity of risk events that may occur5. References = 1: Key risk indicator - Wikipedia2: What Is A Key Risk Indicator?3: Capital Allocation - Overview, Importance, and Methods4: Project Cost Variance: Definition, Formula, and Examples5: [Annualized Loss Expectancy (ALE)
- Definition, Formula, and Example]
Project cost variances are the differences between the actual and planned costs of a project. Project cost variances may indicate the performance or efficiency of a project, but they do not provide specific information on the risks that may affect the project's objectives, scope, quality, or schedule4. Annualized loss projections are not the most beneficial as a KRI, as they do not directly measure the level of risk associated with a particular process, activity, or system. Annualized loss projections are the estimates of the potential losses that an organization may incur in a year due to various risk events. Annualized loss projections may help the organization to plan and budget for its risk management activities, but they do not provide specific information on the likelihood, frequency, or severity of risk events that may occur5. References = 1: Key risk indicator - Wikipedia2: What Is A Key Risk Indicator?3: Capital Allocation - Overview, Importance, and Methods4: Project Cost Variance: Definition, Formula, and Examples5: [Annualized Loss Expectancy (ALE)
- Definition, Formula, and Example]
CRISC Exam Question 402
An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:
Correct Answer: C
Cyber risk insurance is a type of insurance policy that provides coverage against losses and damages caused by cyber incidents such as data breaches, hacking, and other cyber attacks. When an organization decides to purchase cyber risk insurance, it transfers the risk of financial loss due to a cyber incident to the insurance company. In the scenario described in the question, the organization allowed its cyber risk insurance to lapse while seeking a new insurance provider. This means that the organization is currently not covered by any cyber risk insurance policy and is therefore exposed to financial losses due to cyber incidents. The risk practitioner should report to management that the risk has been accepted. Accepting risk means that the organization is aware of the potential consequences of the risk and has decided not to take any action to mitigate, transfer, or avoid it. The other options are not correct because they do not reflect the current situation of the organization. The organization has not transferred the risk to another party, as it has no cyber risk insurance policy in place. The organization has not mitigated the risk, as it has not implemented anycontrols or measures to reduce the likelihood or impact of the risk. The organization has not avoided the risk, as it has not eliminated the source or cause of the risk or changed its activities to prevent the risk from occurring. References = CRISC Review Manual, pages 32-331; CRISC Review Questions, Answers & Explanations Manual, page 752
CRISC Exam Question 403
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
Correct Answer: D
The most concerning issue when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment is that the controls had recurring noncompliance. This indicates that the vendor's controls are not operating as intended or designed, and that the vendor is not taking corrective actions to address the control deficiencies. This can increase the risk exposure and liability for the organization that outsources the service or function to the vendor. The report being provided directly from the vendor, the risk associated with multiple control gaps being accepted, and the control owners disagreeing with the auditor's recommendations are other possible issues, but they are not as critical as the recurring noncompliance. References = ISACA Certified in Risk and Information Systems Control (CRISC) Certification Exam Question and Answers, question 11; CRISC Review Manual, 6th Edition, page 144.
CRISC Exam Question 404
Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?
Correct Answer: C
Key risk indicators (KRIs) are metrics that help organizations monitor and evaluate the level of risk they are exposed to. They provide early warning signals of potential issues that could affect the achievement of organizational goals12.
The most important data source for monitoring KRIs is automated logs collected from different systems, which are records that capture and store the details and history of the transactions or activities that are performed by the organization's processes, systems, or controls34.
Automated logs collected from different systems are the most important data source because they provide timely and accurate data and information on the performance and status of the organization's operations, and enable the detection and reporting of any deviations, anomalies, or issues that may indicate a risk event34.
Automated logs collected from different systems are also the most important data source because they support the accountability and auditability of the organization's operations, and facilitate the investigation and resolution of any risk event34.
The other options are not the most important data sources, but rather possible inputs or factors that may influence or affect the KRIs. For example:
Directives from legal and regulatory authorities are documents that provide the expectations and obligations of the external authorities or bodies that govern or oversee the organization's activities and operations, such as laws, regulations, standards, or contracts5 . However, these documents are not the most important data source becausethey do not directly measure or monitor the level of risk exposure, but rather provide the criteria or framework for risk compliance5 .
Audit reports from internal information systems audits are documents that provide the findings and recommendations of the independent and objective assessment of the adequacy and effectiveness of the organization's information systems, processes, and controls . However, these documents are not the most important data source because they do not directly measure or monitor the level of risk exposure, but rather provide the assurance or improvement for risk management .
Trend analysis of external risk factors is a technique that involves analyzing and forecasting the changes and impacts of the external factors that influence the organization's operations, such as technology, competition, regulation, or customer behavior . However, this technique is not the most important data source because it does not directly measure or monitor the level of risk exposure, but rather provide the insight or prediction for risk identification . References =
1: Key Risk Indicators: A Practical Guide | SafetyCulture1
2: Key risk indicator - Wikipedia2
3: Database Activity Monitoring - Wikipedia3
4: Database Activity Monitoring (DAM) | Imperva4
5: Regulatory Compliance - Wikipedia5
Regulatory Compliance Management Software | MetricStream
IT Audit and Assurance Standards, ISACA, 2014
IT Audit and Assurance Guidelines, ISACA, 2014
Trend Analysis - Investopedia
Trend Analysis: A Definition and Examples
The most important data source for monitoring KRIs is automated logs collected from different systems, which are records that capture and store the details and history of the transactions or activities that are performed by the organization's processes, systems, or controls34.
Automated logs collected from different systems are the most important data source because they provide timely and accurate data and information on the performance and status of the organization's operations, and enable the detection and reporting of any deviations, anomalies, or issues that may indicate a risk event34.
Automated logs collected from different systems are also the most important data source because they support the accountability and auditability of the organization's operations, and facilitate the investigation and resolution of any risk event34.
The other options are not the most important data sources, but rather possible inputs or factors that may influence or affect the KRIs. For example:
Directives from legal and regulatory authorities are documents that provide the expectations and obligations of the external authorities or bodies that govern or oversee the organization's activities and operations, such as laws, regulations, standards, or contracts5 . However, these documents are not the most important data source becausethey do not directly measure or monitor the level of risk exposure, but rather provide the criteria or framework for risk compliance5 .
Audit reports from internal information systems audits are documents that provide the findings and recommendations of the independent and objective assessment of the adequacy and effectiveness of the organization's information systems, processes, and controls . However, these documents are not the most important data source because they do not directly measure or monitor the level of risk exposure, but rather provide the assurance or improvement for risk management .
Trend analysis of external risk factors is a technique that involves analyzing and forecasting the changes and impacts of the external factors that influence the organization's operations, such as technology, competition, regulation, or customer behavior . However, this technique is not the most important data source because it does not directly measure or monitor the level of risk exposure, but rather provide the insight or prediction for risk identification . References =
1: Key Risk Indicators: A Practical Guide | SafetyCulture1
2: Key risk indicator - Wikipedia2
3: Database Activity Monitoring - Wikipedia3
4: Database Activity Monitoring (DAM) | Imperva4
5: Regulatory Compliance - Wikipedia5
Regulatory Compliance Management Software | MetricStream
IT Audit and Assurance Standards, ISACA, 2014
IT Audit and Assurance Guidelines, ISACA, 2014
Trend Analysis - Investopedia
Trend Analysis: A Definition and Examples
CRISC Exam Question 405
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Correct Answer: D
Residual risk is the level of risk that remains after applying controls or other risk treatments. A critical patch is a type of control that aims to reduce the risk of a known vulnerability being exploited by attackers. If the patch implementation fails, the control is ineffective and the risk is not reduced. Therefore, the residual risk is increased, as the organization is still exposed to the potential negative consequences of the vulnerability.
References:
*ISACA, Risk and Information Systems Control Review Manual, 7th Edition, 2020, p. 2111
*ISACA, Practical Patch Management and Mitigation2
References:
*ISACA, Risk and Information Systems Control Review Manual, 7th Edition, 2020, p. 2111
*ISACA, Practical Patch Management and Mitigation2
- Other Version
- 2378ISACA.CRISC.v2025-09-26.q726
- 2627ISACA.CRISC.v2025-08-27.q675
- 3952ISACA.CRISC.v2025-01-04.q999
- 1713ISACA.CRISC.v2024-06-13.q683
- 2316ISACA.CRISC.v2024-04-02.q999
- 2919ISACA.CRISC.v2023-07-10.q544
- 5687ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5562ISACA.CRISC.v2022-02-22.q349
- 5835ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 115Cisco.400-007.v2026-01-16.q194
- 106ABPMP.CBPA.v2026-01-16.q55
- 104Huawei.H19-301_V3.0.v2026-01-16.q84
- 105ACAMS.CAMS-CN.v2026-01-16.q392
- 119SAP.C_BCBAI_2509.v2026-01-15.q13
- 215DAMA.DMF-1220.v2026-01-15.q271
- 138SAP.C_SIGDA_2403.v2026-01-15.q66
- 277ISACA.CRISC.v2026-01-15.q649
- 128PaloAltoNetworks.NetSec-Pro.v2026-01-15.q26
- 171Splunk.SPLK-1002.v2026-01-14.q121
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2026-01-15.q649 Practice Test
