100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CRISC Review Questions with correct answers

Rating
-
Sold
-
Pages
118
Grade
A+
Uploaded on
12-10-2025
Written in
2025/2026

CRISC Review Questions with correct answers

Institution
CRISC
Course
CRISC











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CRISC
Course
CRISC

Document information

Uploaded on
October 12, 2025
Number of pages
118
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CRISC Review Questions with correct answers
| | | | |




R1-1 |Which |of |the |following |is |MOST |important |to |determine |when |defining |risk |management
|strategies?



A. |Risk |assessment |criteria

B. |IT |architecture |complexity

C. |An |enterprise |disaster |recovery |plan

D. |Business |objectives |and |operations |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Information |on |the |internal |and |external |environment |must |be |collected |to |define |a |
strategy |and |identify |its

impact. |Risk |assessment |criteria |alone |are |not |sufficient.

B. |IT |architecture |complexity |is |more |directly |related |to |assessing |risk |than |defining |strategies.

C. |An |enterprise |disaster |recovery |plan |is |more |directly |related |to |mitigating |the |risk.

D. |While |defining |risk |management |strategies, |the |risk |practitioner |needs |to |analyze |the |
organization's

objectives |and |risk |tolerance |and |define |a |risk |management |framework |based |on |this |analysis.
|Some



organizations |may |accept |known |risk, |while |others |may |invest |in |and |apply |mitigating |controls |
to

reduce |risk.



R1-2 |Which |of |the |following |is |the |MOST |important |information |to |include |in |a |risk |
management |strategic |plan?

A. |Risk |management |staffing |requirements

B. |The |risk |management |mission |statement

C. |Risk |mitigation |investment |plans

,D. |The |current |state |and |desired |future |state |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Risk |management |staffing |requirements |are |generally |driven |by |a |robust |understanding |of |
the |current |and

desired |future |state.

B. |The |risk |management |mission |statement |is |important |but |is |not |an |actionable |part |of |a |risk
|management



strategic |plan.

C. |Risk |mitigation |investment |plans |are |generally |driven |by |a |robust |understanding |of |the |
current |and |desired

future |state.

D. |It |is |most |important |to |paint |a |vision |for |the |future |and |then |draw |a |road |map |from |the |
starting |point;

therefore, |this |requires |that |the |current |state |and |desired |future |state |be |fully |understood.



R1-3 |Information |that |is |no |longer |required |to |support |the |main |purpose |of |the |business |from
|an |information |security



perspective |should |be:

A. |analyzed |under |the |retention |policy.

B. |protected |under |the |information |classification |policy.

C. |analyzed |under |the |backup |policy.

D. |protected |under |the |business |impact |analysis. |- |correct |answer |A |is |the |correct |answer.

Justification:

A. |Information |that |is |no |longer |required |should |be |analyzed |under |the |retention |policy |to |
determine

whether |the |organization |is |required |to |maintain |the |data |for |business, |legal |or |regulatory |
reasons.

Keeping |data |that |are |no |longer |required |unnecessarily |consumes |resources; |may |be |in |breach
|of

,legal |and |regulatory |obligations |regarding |retention |of |data; |and, |in |the |case |of |sensitive |
personal

information, |can |increase |the |risk |of |data |compromise.

B. |The |information |classification |policy |should |specify |retention |and |destruction |of |information
|that |is |no |longer



of |value |to |the |core |business, |as |applicable.

C. |The |backup |policy |is |generally |based |on |recovery |point |objectives. |The |information |
classification |policy

should |specify |retention |and |destruction |of |backup |media.

D. |A |business |impact |analysis |can |help |determine |that |this |information |does |not |support |the |
main |objective |of |the

business, |but |does |not |indicate |the |action |to |take.



R1-4 |An |enterprise |has |outsourced |the |majority |of |its |IT |department |to |a |third |party |whose |
servers |are |in |a |foreign

country. |Which |of |the |following |is |the |MOST |critical |security |consideration?

A. |A |security |breach |notification |may |get |delayed |due |to |the |time |difference.

B. |Additional |network |intrusion |detection |sensors |should |be |installed, |resulting |in |additional |
cost.

C. |The |enterprise |could |be |unable |to |monitor |compliance |with |its |internal |security |and |privacy
|guidelines.



D. |Laws |and |regulations |of |the |country |of |origin |may |not |be |enforceable |in |the |foreign |
country. |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Security |breach |notification |is |not |a |problem. |Time |difference |does |not |play |a |role |in |a |24/7
|environment.



Mobile |devices |(smartphones, |tablets, |etc.) |are |usually |available |to |communicate |a |
notification.

B. |The |need |for |additional |network |intrusion |sensors |is |a |manageable |problem |that |requires |
additional |funding,

, but |can |be |addressed.

C. |Outsourcing |does |not |remove |the |enterprise's |responsibility |regarding |internal |
requirements.

D. |Laws |and |regulations |of |the |country |of |origin |may |not |be |enforceable |in |the |foreign |
country.

Conversely, |the |laws |and |regulations |of |the |foreign |vendor |may |also |affect |the |enterprise. |
Potential

violation |of |local |laws |applicable |to |the |enterprise |or |the |vendor |may |not |be |recognized |or |
remedied |due

to |the |lack |of |knowledge |of |local |laws |and/or |inability |to |enforce |them.



R1-5 |An |enterprise |recently |developed |a |breakthrough |technology |that |could |provide |a |
significant |competitive |edge.

Which |of |the |following |FIRST |governs |how |this |information |is |to |be |protected |from |within |the |
enterprise?

A. |The |data |classification |policy

B. |The |acceptable |use |policy

C. |Encryption |standards

D. |The |access |control |policy |- |correct |answer |A |is |the |correct |answer.

Justification:

A. |A |data |classification |policy |describes |the |data |classification |categories, |level |of |protection |to
|be |provided



for |each |category |of |data |and |roles |and |responsibilities |of |potential |users, |including |data |
owners.

B. |An |acceptable |use |policy |is |oriented |more |toward |the |end |user |and, |therefore, |does |not |
specifically |address

which |controls |should |be |in |place |to |adequately |protect |information.

C. |Mandated |levels |of |protection, |as |defined |by |the |data |classification |policy, |should |drive |
which |levels |of
R248,72
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Lectpolly

Get to know the seller

Seller avatar
Lectpolly Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
4 months
Number of followers
0
Documents
36
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions