CRISC Exam Question 456
The GREATEST concern when maintaining a risk register is that:
Correct Answer: D
A risk register is a tool that records and tracks the identified risks, their causes, impacts, likelihood, responses, and owners. The greatest concern when maintaining a risk register is that significant changes in risk factors are excluded. Risk factors are the internal and external variables that influence the occurrence and impact of risks. Risk factors can change over time due to changes in the business environment, the IT landscape, the threat landscape, or the regulatory requirements. If the risk register does not reflect the significant changes in risk factors, it may not provide an accurate and current view of the enterprise's risk profile and may not support effective risk management decisions and actions. The other options are not as concerning as the exclusion of significant changes in risk factors, as they involve different aspects of the risk register:
Impacts are recorded in qualitative terms means that the risk register uses descriptive scales, such as low, medium, and high, to measure the potential consequences of the risks. This may not be asprecise or consistent as quantitative measures, such as monetary values or percentages, but it does not necessarily affect the validity or usefulness of the risk register.
Executive management does not perform periodic reviews means that the risk register is not regularly evaluated and updated by the senior leaders of the enterprise. This may indicate a lack of management commitment or oversight for risk management, but it does not directly affect the quality or completeness of the risk register.
IT risk is not linked with IT assets means that the risk register does not associate the identified risks with the specific IT resources, such as hardware, software, data, or services, that are affected by or contribute to the risks. This may limit the visibility and traceability of the risks, but it does not necessarily affect the identification or assessment of the risks. References = Risk and Information Systems Control Study Manual,
7th Edition, Chapter 1, Section 1.2.2.2, pp. 21-22.
Impacts are recorded in qualitative terms means that the risk register uses descriptive scales, such as low, medium, and high, to measure the potential consequences of the risks. This may not be asprecise or consistent as quantitative measures, such as monetary values or percentages, but it does not necessarily affect the validity or usefulness of the risk register.
Executive management does not perform periodic reviews means that the risk register is not regularly evaluated and updated by the senior leaders of the enterprise. This may indicate a lack of management commitment or oversight for risk management, but it does not directly affect the quality or completeness of the risk register.
IT risk is not linked with IT assets means that the risk register does not associate the identified risks with the specific IT resources, such as hardware, software, data, or services, that are affected by or contribute to the risks. This may limit the visibility and traceability of the risks, but it does not necessarily affect the identification or assessment of the risks. References = Risk and Information Systems Control Study Manual,
7th Edition, Chapter 1, Section 1.2.2.2, pp. 21-22.
CRISC Exam Question 457
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Correct Answer: D
* Control processes are the procedures and activities that aim to ensure the effectiveness and efficiency of the organization's operations, the reliability of its information, and the compliance with its policies and regulations12.
* The ongoing efficiency of control processes is the degree to which the control processes achieve their intended results with minimum resources, costs, or waste34.
* The best way to determine the ongoing efficiency of control processes is to analyze key performance indicators (KPIs), which are quantifiable measures of progress toward an intended result, such as a strategic objective or a desired outcome56.
* Analyzing KPIs is the best way because it provides a systematic and consistent method of evaluating the performance of the control processes, and identifying the areas of improvement or optimization56.
* Analyzing KPIs is also the best way because it enables the organization to monitor and report the efficiency of the control processes to the relevant stakeholders, and to take corrective or preventive actions when necessary56.
* The other options are not the best way, but rather possible sources of information or inputs that may support or complement the analysis of KPIs. For example:
* Performing annual risk assessments is a way to identify and evaluate the risks that may affect the organization's objectives, and to determine the adequacy and effectiveness of the control processes in mitigating those risks12. However, this way is not the best because it is periodic rather than continuous, and may not capture the changes or trends in the efficiency of the control processes12.
* Interviewing process owners is a way to collect and verify the information and feedback from the people who are responsible for designing, implementing, and operating the control processes12. However, this way is not the best because it is subjective and qualitative, and may not provide reliable or comparable data on the efficiency of the control processes12.
* Reviewing the risk register is a way to examine and update the documentation and status of the risks and the control processes that are associated with them12. However, this way is not the best because it is descriptive rather than analytical, and may not measure or evaluate the efficiency of the control processes12. References =
* 1: Risk IT Framework, ISACA, 2009
* 2: IT Risk Management Framework, University of Toronto, 2017
* 3: The Control Process | Principles of Management4
* 4: Control Management: What it is + Why It's Essential | Adobe Workfront5
* 5: What is a Key Performance Indicator (KPI)? Guide & Examples - Qlik1
* 6: What is a Key Performance Indicator (KPI)? - KPI.org2
* The ongoing efficiency of control processes is the degree to which the control processes achieve their intended results with minimum resources, costs, or waste34.
* The best way to determine the ongoing efficiency of control processes is to analyze key performance indicators (KPIs), which are quantifiable measures of progress toward an intended result, such as a strategic objective or a desired outcome56.
* Analyzing KPIs is the best way because it provides a systematic and consistent method of evaluating the performance of the control processes, and identifying the areas of improvement or optimization56.
* Analyzing KPIs is also the best way because it enables the organization to monitor and report the efficiency of the control processes to the relevant stakeholders, and to take corrective or preventive actions when necessary56.
* The other options are not the best way, but rather possible sources of information or inputs that may support or complement the analysis of KPIs. For example:
* Performing annual risk assessments is a way to identify and evaluate the risks that may affect the organization's objectives, and to determine the adequacy and effectiveness of the control processes in mitigating those risks12. However, this way is not the best because it is periodic rather than continuous, and may not capture the changes or trends in the efficiency of the control processes12.
* Interviewing process owners is a way to collect and verify the information and feedback from the people who are responsible for designing, implementing, and operating the control processes12. However, this way is not the best because it is subjective and qualitative, and may not provide reliable or comparable data on the efficiency of the control processes12.
* Reviewing the risk register is a way to examine and update the documentation and status of the risks and the control processes that are associated with them12. However, this way is not the best because it is descriptive rather than analytical, and may not measure or evaluate the efficiency of the control processes12. References =
* 1: Risk IT Framework, ISACA, 2009
* 2: IT Risk Management Framework, University of Toronto, 2017
* 3: The Control Process | Principles of Management4
* 4: Control Management: What it is + Why It's Essential | Adobe Workfront5
* 5: What is a Key Performance Indicator (KPI)? Guide & Examples - Qlik1
* 6: What is a Key Performance Indicator (KPI)? - KPI.org2
CRISC Exam Question 458
When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?
Correct Answer: C
The number of emergency change requests is the most important factor to review when confirming whether implemented controls are operating effectively, as it indicates the frequency and severity of incidents or issues that require urgent changes to the controls, and may reflect the control deficiencies or failures. The results of benchmarking studies, the results of risk assessments, and the maturity model are not the most important factors, as they are more related to the comparison, evaluation, or improvement of the controls, respectively, rather than the confirmation of the control effectiveness. References = CRISC Review Manual, 7th Edition, page 154.
CRISC Exam Question 459
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Correct Answer: B
The risk practitioner's primary focus when determining whether controls are adequate to mitigate risk should be the level of residual risk, because this indicates the amount and type of risk that remains after applying the controls, and whether it is acceptable or not. Residual risk is the risk that is left over after the risk response actions have been taken, such as implementing or improving controls. Controls are the measures or actions that are designed and performed to reduce the likelihood and/or impact of a risk event, or to exploit the opportunities that a risk event may create. The adequacy of controls to mitigate risk depends on how well they address the root causes or sources of the risk, and how effectively and efficiently they reduce the risk exposure and value. The level of residual risk reflects the adequacy of controls to mitigate risk, as it shows the gap between the inherent risk and the actual risk, and whether it is within the organization's risk appetite and tolerance. The risk practitioner should focus on the level of residual risk when determining whether controls are adequate to mitigate risk, as it helps to evaluate and compare the benefits and costs of the controls, and to decide on the best risk response strategy, such as accepting, avoiding, transferring, or further reducing the risk. The other options are less important or relevant to focus on when determining whether controls are adequate to mitigate risk. Sensitivity analysis is a technique that measures how the risk value changes when one or more input variables are changed, such as the probability, impact, or control effectiveness. Sensitivity analysis can help to identify and prioritize the most influential or critical variables that affect the risk value, and to test the robustness or reliability of the risk assessment. However, sensitivity analysis does not directly indicate the adequacy of controls to mitigate risk, as it does not measure the level of residual risk or the risk acceptance criteria. Cost-benefit analysis is a technique that compares the expected benefits and costs of a control or a risk response action, and determines whether it is worthwhile or not. Cost-benefit analysis can help to justify and optimize the investment or resource allocation for the control or the risk response action, and to ensure that it is aligned with the organization's objectives and value. However, cost-benefit analysis does not directly indicate the adequacy of controls to mitigate risk, as it does not measure the level of residual risk or the risk acceptance criteria. Risk appetite is the amount and type of risk that an organization is willing to accept in pursuit of its objectives. Risk appetite can help to define and communicate the organization's risk preferences and boundaries, and to guide the risk decision-making and behavior. However, risk appetite does not directly indicate the adequacy of controls to mitigate risk, as it does not measure the level of residual risk or the actual risk performance. References = Risk IT Framework, ISACA, 2022, p. 131
CRISC Exam Question 460
Which of the following is the MOST important document regarding the treatment of sensitive data?
Correct Answer: D
The information classification policy is the most important document regarding the treatment of sensitive data, because it defines the categories and criteria for classifying data according to their sensitivity, confidentiality, and value to the organization, and specifies the appropriate handling and protection measures for each category. Sensitive data are data that contain personal, proprietary, or confidential information that may cause harm or damage to the organization or its stakeholders if disclosed, modified, or destroyed without authorization. An information classification policy helps to ensure that sensitive data are identified and treated in a consistent and secure manner, and that the organization complies with the applicable laws and regulations regarding data protection and privacy. An encryption policy, an organization risk profile, and a digital rights management policy are all useful documents for the treatment of sensitive data, but they are not the most important document, as they do not directly address the classification and handling of sensitive data.
References = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.3.2, page 158
References = Risk and Information Systems Control Study Manual, Chapter 4, Section 4.3.2, page 158
- Other Version
- 2378ISACA.CRISC.v2025-09-26.q726
- 2626ISACA.CRISC.v2025-08-27.q675
- 3952ISACA.CRISC.v2025-01-04.q999
- 1712ISACA.CRISC.v2024-06-13.q683
- 2316ISACA.CRISC.v2024-04-02.q999
- 2919ISACA.CRISC.v2023-07-10.q544
- 5687ISACA.CRISC.v2022-05-25.q338
- 76ISACA.Actual4dump.CRISC.v2022-04-12.by.newman.349q.pdf
- 5562ISACA.CRISC.v2022-02-22.q349
- 5835ISACA.CRISC.v2021-10-27.q295
- 42ISACA.Updatedumps.CRISC.v2021-09-05.by.bonnie.114q.pdf
- Latest Upload
- 119SAP.C_BCBAI_2509.v2026-01-15.q13
- 215DAMA.DMF-1220.v2026-01-15.q271
- 138SAP.C_SIGDA_2403.v2026-01-15.q66
- 243ISACA.CRISC.v2026-01-15.q649
- 128PaloAltoNetworks.NetSec-Pro.v2026-01-15.q26
- 170Splunk.SPLK-1002.v2026-01-14.q121
- 170EMC.NCP-AII.v2026-01-14.q144
- 164Microsoft.AZ-800.v2026-01-13.q144
- 176Microsoft.MS-102.v2026-01-13.q258
- 122HP.HPE2-E84.v2026-01-13.q17
[×]
Download PDF File
Enter your email address to download ISACA.CRISC.v2026-01-15.q649 Practice Test
