CRISC Exam Question 421
A risk register BEST facilitates which of the following risk management functions?
Correct Answer: C
Purpose of a Risk Register:
A risk register consolidates all identified risks, their status, and mitigation actions in one place. It serves as a tool for tracking and managing risks systematically.
Facilitating Risk Management Functions:
By documenting risk scenarios, a risk register provides a comprehensive view of potential threats and their impact on the organization.
It enables effective communication and review of these scenarios with stakeholders, ensuring that all relevant parties are aware of and understand the risks.
Engaging Stakeholders:
Reviewing the risk register with stakeholders helps in validating the risks, assessing their impact, and determining appropriate responses.
It fosters collaboration and ensures that risk management activities are aligned with the stakeholders' expectations and the organization's objectives.
Comparing Other Functions:
Analyzing Risk Appetite:While important, this is not the primary function of a risk register.
Influencing Risk Culture:The risk register contributes to risk culture but is primarily a tracking and communication tool.
Articulating Senior Management's Intent:This is more related to policy and strategy documents, whereas the risk register is a practical tool for managing specific risks.
References:
The CRISC Review Manual highlights the role of the risk register in consolidating risk information and facilitating stakeholder engagement (CRISC Review Manual, Chapter 2: IT Risk Assessment, Section 2.6 Risk Register) .
A risk register consolidates all identified risks, their status, and mitigation actions in one place. It serves as a tool for tracking and managing risks systematically.
Facilitating Risk Management Functions:
By documenting risk scenarios, a risk register provides a comprehensive view of potential threats and their impact on the organization.
It enables effective communication and review of these scenarios with stakeholders, ensuring that all relevant parties are aware of and understand the risks.
Engaging Stakeholders:
Reviewing the risk register with stakeholders helps in validating the risks, assessing their impact, and determining appropriate responses.
It fosters collaboration and ensures that risk management activities are aligned with the stakeholders' expectations and the organization's objectives.
Comparing Other Functions:
Analyzing Risk Appetite:While important, this is not the primary function of a risk register.
Influencing Risk Culture:The risk register contributes to risk culture but is primarily a tracking and communication tool.
Articulating Senior Management's Intent:This is more related to policy and strategy documents, whereas the risk register is a practical tool for managing specific risks.
References:
The CRISC Review Manual highlights the role of the risk register in consolidating risk information and facilitating stakeholder engagement (CRISC Review Manual, Chapter 2: IT Risk Assessment, Section 2.6 Risk Register) .
CRISC Exam Question 422
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross- site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Correct Answer: C
Cross-site scripting (XSS) and SQL injection are two common types of web application attacks that can compromise the confidentiality, integrity, and availability of data and systems. XSS allows an attacker to inject malicious code into a web page that is viewed by other users, while SQL injection allows an attacker to execute arbitrary commands on a database server by manipulating the input parameters of a web application.
Both attacks can result in data theft, unauthorized access, defacement, denial of service, and more.
To mitigate these attacks, the best option is to require the software vendor to remediate the vulnerabilities by applying secure coding practices, such as input validation, output encoding, parameterized queries, and HTML sanitization. These techniques can prevent or limit the impact of XSS and SQL injection by ensuring that user input is not interpreted as code or commands by the web browser or the database server. The software vendor should also provide regular updates and patches to fix any known or newly discovered vulnerabilities.
The other options are not effective or acceptable ways to mitigate these attacks. Monitoring the databases for abnormal activity can help detect and respond to SQL injection attacks, but it does not prevent them from happening or address the root cause of the vulnerability. Approving an exception to allow the software to continue operating can expose the organization to unnecessary risks and liabilities, as well as violate compliance requirements and standards. Accepting the risk and letting the vendor run the software as is can also have serious consequences for the organization, as it implies that the potential impact and likelihood of the attacks are low or acceptable, which may not be the case. References = IT Risk Resources | ISACA CRISC Certification | Certified in Risk and Information Systems Control | ISACA Cross Site Scripting Prevention Cheat Sheet - OWASP A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm | EURASIP Journal on Information Security | Full Text Difference Between XSS and SQL Injection - GeeksforGeeks
Both attacks can result in data theft, unauthorized access, defacement, denial of service, and more.
To mitigate these attacks, the best option is to require the software vendor to remediate the vulnerabilities by applying secure coding practices, such as input validation, output encoding, parameterized queries, and HTML sanitization. These techniques can prevent or limit the impact of XSS and SQL injection by ensuring that user input is not interpreted as code or commands by the web browser or the database server. The software vendor should also provide regular updates and patches to fix any known or newly discovered vulnerabilities.
The other options are not effective or acceptable ways to mitigate these attacks. Monitoring the databases for abnormal activity can help detect and respond to SQL injection attacks, but it does not prevent them from happening or address the root cause of the vulnerability. Approving an exception to allow the software to continue operating can expose the organization to unnecessary risks and liabilities, as well as violate compliance requirements and standards. Accepting the risk and letting the vendor run the software as is can also have serious consequences for the organization, as it implies that the potential impact and likelihood of the attacks are low or acceptable, which may not be the case. References = IT Risk Resources | ISACA CRISC Certification | Certified in Risk and Information Systems Control | ISACA Cross Site Scripting Prevention Cheat Sheet - OWASP A novel technique to prevent SQL injection and cross-site scripting attacks using Knuth-Morris-Pratt string match algorithm | EURASIP Journal on Information Security | Full Text Difference Between XSS and SQL Injection - GeeksforGeeks
CRISC Exam Question 423
Which of the following is the MOST common concern associated with outsourcing to a service provider?
Correct Answer: C
The most common concern associated with outsourcing to a service provider is unauthorized data usage, which means the misuse, disclosure, or theft of the organization's data by the service provider or its employees, contractors, or subcontractors1. Unauthorized data usage can pose significant risks to the organization, such as:
Data security and privacy breaches, which can compromise the confidentiality, integrity, and availability of the data, and expose the organization to legal liability, regulatory penalties, reputational damage, or loss of trust and credibility2.
Data quality and accuracy issues, which can affect the reliability and validity of the data, and impair the decision-making, reporting, or performance of the organization3.
Data ownership and control issues, which can limit the access and rights of the organization to its own data, and create dependency or lock-in with the service provider4.
The other options are not the most common concern associated with outsourcing to a service provider, because:
Lack of technical expertise is a potential but not prevalent concern associated with outsourcing to a service provider, as it may affect the quality and efficiency of the services provided by the service provider, and the compatibility and integration of the services with the organization's systems and processes5. However, most service providers have sufficient technical expertise in their domain or field, and they can offer specialized skills or resources that the organization may not have internally6.
Combining incompatible duties is a possible but not frequent concern associated with outsourcing to a service provider, as it may create conflicts of interest or segregation of duties issues for the service provider or the organization, and increase the risk of errors, fraud, or abuse7. However, most service providers have adequate governance and control mechanisms to prevent or mitigate such issues, and they can adhere to the organization's policies and standards regarding the separation of duties8.
Denial of service attacks is a rare but not common concern associated with outsourcing to a service provider, as it may disrupt the availability or functionality of the services provided by the service provider, and affect the operations or continuity of the organization. However, most service providers have robust security measures and contingency plans to protect and recover from such attacks, and they can ensure the resilience and reliability of the services.
References =
Unauthorized Data Usage - CIO Wiki
What is outsourcing? Definitions, benefits, challenges, processes, advice | CIO The Pros and Cons of Outsourcing in 2023 - GrowthForce
13 Common Problems of Outsourcing and How to Avoid Them - ENOU Labs
The Top 10 Problems with Outsourcing Implementation - SSON
10 problems with outsourcing (+ Solutions for each) - Time Doctor Blog
Segregation of Duties - CIO Wiki
Outsourcing Governance - CIO Wiki
[Denial-of-Service Attack - CIO Wiki]
[Business Continuity Planning - CIO Wiki]
Data security and privacy breaches, which can compromise the confidentiality, integrity, and availability of the data, and expose the organization to legal liability, regulatory penalties, reputational damage, or loss of trust and credibility2.
Data quality and accuracy issues, which can affect the reliability and validity of the data, and impair the decision-making, reporting, or performance of the organization3.
Data ownership and control issues, which can limit the access and rights of the organization to its own data, and create dependency or lock-in with the service provider4.
The other options are not the most common concern associated with outsourcing to a service provider, because:
Lack of technical expertise is a potential but not prevalent concern associated with outsourcing to a service provider, as it may affect the quality and efficiency of the services provided by the service provider, and the compatibility and integration of the services with the organization's systems and processes5. However, most service providers have sufficient technical expertise in their domain or field, and they can offer specialized skills or resources that the organization may not have internally6.
Combining incompatible duties is a possible but not frequent concern associated with outsourcing to a service provider, as it may create conflicts of interest or segregation of duties issues for the service provider or the organization, and increase the risk of errors, fraud, or abuse7. However, most service providers have adequate governance and control mechanisms to prevent or mitigate such issues, and they can adhere to the organization's policies and standards regarding the separation of duties8.
Denial of service attacks is a rare but not common concern associated with outsourcing to a service provider, as it may disrupt the availability or functionality of the services provided by the service provider, and affect the operations or continuity of the organization. However, most service providers have robust security measures and contingency plans to protect and recover from such attacks, and they can ensure the resilience and reliability of the services.
References =
Unauthorized Data Usage - CIO Wiki
What is outsourcing? Definitions, benefits, challenges, processes, advice | CIO The Pros and Cons of Outsourcing in 2023 - GrowthForce
13 Common Problems of Outsourcing and How to Avoid Them - ENOU Labs
The Top 10 Problems with Outsourcing Implementation - SSON
10 problems with outsourcing (+ Solutions for each) - Time Doctor Blog
Segregation of Duties - CIO Wiki
Outsourcing Governance - CIO Wiki
[Denial-of-Service Attack - CIO Wiki]
[Business Continuity Planning - CIO Wiki]
CRISC Exam Question 424
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
Correct Answer: A
The first thing that should be done when addressing security concerns associated with a new Internet of Things (IoT) solution is to develop new IoT risk scenarios. IoT is a network of physical devices, such as sensors, cameras, appliances, etc., that are connected to the internet and can collect, process, and exchange data. IoT introduces new security concerns, such as privacy, confidentiality, integrity, availability, and accountability of the data and devices, as well as new threats and vulnerabilities, such as unauthorized access, manipulation, or disruption of the data and devices. Developing new IoT risk scenarios is the first thing that should be done, because it helps to identify, analyze, and evaluate the potential risks that could affect the IoT solution's objectives or operations. Developing new IoT risk scenarios also helps to select the most appropriate and effective controls to minimize the risks, such as avoiding, reducing, transferring, or accepting the risks. The other options are not the first thing that should be done, although they may be part of or derived from the IoT risk scenarios. Implementing IoT device monitoring software, introducing controls to the new threat environment, and engaging external security reviews are all activities that can help to support or improve the security of the IoT solution, but they do not necessarily identify, analyze, or evaluate the risks that could affect the IoT solution. References = 1
CRISC Exam Question 425
Which of the following is the GREATEST risk associated with an environment that lacks documentation of the architecture?
Correct Answer: A
Architecture is the design and structure of a system or a process, such as an IT system or a business process.
Architecture documentation is the document that describes and explains the architecture, such as its components, functions, relationships, requirements, constraints, orstandards. Architecture documentation can help to understand, communicate, and improve the system or the process1.
An environment that lacks documentation of the architecture faces a great risk of unknown vulnerabilities, which are the weaknesses or flaws in the system or the process that could be exploited by threats or attackers, but are not identified or addressed by the organization. Unknown vulnerabilities can pose a serious risk to the organization, because they can:
Compromise the confidentiality, integrity, and availability of the system or the process, and the information or resources that it handles or supports Cause financial, operational, reputational, or legal damages or losses to the organization, such as data breaches, fraud, errors, delays, or fines Remain undetected or unresolved for a long time, and increase the exposure or impact of the risk over time Require more resources or efforts to mitigate or recover from the risk, and reduce the efficiency or effectiveness of the risk management process23 Lack of documentation of the architecture can increase the risk of unknown vulnerabilities, because it can:
Prevent or hinder the identification and assessment of the vulnerabilities, and the evaluation and prioritization of the risks Impede or delay the implementation and enforcement of the controls or safeguards to prevent or reduce the vulnerabilities, and the monitoring and reporting of the risk status and progress Obstruct or limit the communication and coordination among the stakeholders, and the awareness and accountability of the risk owners and users Restrict or hamper the review and improvement of the system or the process, and the learning and feedback of the risk management4 The other options are not the greatest risks associated with an environment that lacks documentation of the architecture, but rather some of the possible causes or consequences of it.Legacy technology systems are outdated or obsolete systems that are still in use by the organization, but are no longer supported or maintained by the vendors or developers. Legacy technology systems can be a cause of lack of documentation of the architecture, as they may have been developed or acquired without proper documentation, or the documentation may have been lost or discarded over time. Network isolation is the separation or segregation of a network or a system from other networks or systems, either physically or logically, to prevent or limit the access or communication between them. Network isolation can be a consequence of lack of documentation of the architecture, as it may result from the inability or difficulty to integrate or connect the system or the process with other systems or processes. Overlapping threats are threats that affect more than one system or process, or have similar or related sources or causes, such as natural disasters, cyberattacks, or human errors.
Overlapping threats can be a consequence of lack of documentation of the architecture, as they may arise from the lack of understanding or coordination of the system or the process with other systems or processes. References = Architecture Documentation - ISACA Vulnerability - ISACA The Risks of Not Having a Vulnerability Management Program The Importance of Architecture Documentation - ISACA
[The Risk of Poor Document Control - ComplianceBridge]
[CRISC Review Manual, 7th Edition]
Architecture documentation is the document that describes and explains the architecture, such as its components, functions, relationships, requirements, constraints, orstandards. Architecture documentation can help to understand, communicate, and improve the system or the process1.
An environment that lacks documentation of the architecture faces a great risk of unknown vulnerabilities, which are the weaknesses or flaws in the system or the process that could be exploited by threats or attackers, but are not identified or addressed by the organization. Unknown vulnerabilities can pose a serious risk to the organization, because they can:
Compromise the confidentiality, integrity, and availability of the system or the process, and the information or resources that it handles or supports Cause financial, operational, reputational, or legal damages or losses to the organization, such as data breaches, fraud, errors, delays, or fines Remain undetected or unresolved for a long time, and increase the exposure or impact of the risk over time Require more resources or efforts to mitigate or recover from the risk, and reduce the efficiency or effectiveness of the risk management process23 Lack of documentation of the architecture can increase the risk of unknown vulnerabilities, because it can:
Prevent or hinder the identification and assessment of the vulnerabilities, and the evaluation and prioritization of the risks Impede or delay the implementation and enforcement of the controls or safeguards to prevent or reduce the vulnerabilities, and the monitoring and reporting of the risk status and progress Obstruct or limit the communication and coordination among the stakeholders, and the awareness and accountability of the risk owners and users Restrict or hamper the review and improvement of the system or the process, and the learning and feedback of the risk management4 The other options are not the greatest risks associated with an environment that lacks documentation of the architecture, but rather some of the possible causes or consequences of it.Legacy technology systems are outdated or obsolete systems that are still in use by the organization, but are no longer supported or maintained by the vendors or developers. Legacy technology systems can be a cause of lack of documentation of the architecture, as they may have been developed or acquired without proper documentation, or the documentation may have been lost or discarded over time. Network isolation is the separation or segregation of a network or a system from other networks or systems, either physically or logically, to prevent or limit the access or communication between them. Network isolation can be a consequence of lack of documentation of the architecture, as it may result from the inability or difficulty to integrate or connect the system or the process with other systems or processes. Overlapping threats are threats that affect more than one system or process, or have similar or related sources or causes, such as natural disasters, cyberattacks, or human errors.
Overlapping threats can be a consequence of lack of documentation of the architecture, as they may arise from the lack of understanding or coordination of the system or the process with other systems or processes. References = Architecture Documentation - ISACA Vulnerability - ISACA The Risks of Not Having a Vulnerability Management Program The Importance of Architecture Documentation - ISACA
[The Risk of Poor Document Control - ComplianceBridge]
[CRISC Review Manual, 7th Edition]
- Other Version
- 2378ISACA.CRISC.v2025-09-26.q726
- 2626ISACA.CRISC.v2025-08-27.q675
- 3952ISACA.CRISC.v2025-01-04.q999
- 1713ISACA.CRISC.v2024-06-13.q683
- 2316ISACA.CRISC.v2024-04-02.q999
- 2919ISACA.CRISC.v2023-07-10.q544
- 5687ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5562ISACA.CRISC.v2022-02-22.q349
- 5835ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 115Cisco.400-007.v2026-01-16.q194
- 105ABPMP.CBPA.v2026-01-16.q55
- 103Huawei.H19-301_V3.0.v2026-01-16.q84
- 104ACAMS.CAMS-CN.v2026-01-16.q392
- 119SAP.C_BCBAI_2509.v2026-01-15.q13
- 215DAMA.DMF-1220.v2026-01-15.q271
- 138SAP.C_SIGDA_2403.v2026-01-15.q66
- 270ISACA.CRISC.v2026-01-15.q649
- 128PaloAltoNetworks.NetSec-Pro.v2026-01-15.q26
- 171Splunk.SPLK-1002.v2026-01-14.q121
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2026-01-15.q649 Practice Test
