100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

CRISC Review Questions with correct answers

Puntuación
-
Vendido
-
Páginas
118
Grado
A+
Subido en
12-10-2025
Escrito en
2025/2026

CRISC Review Questions with correct answers

Institución
CRISC
Grado
CRISC











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CRISC
Grado
CRISC

Información del documento

Subido en
12 de octubre de 2025
Número de páginas
118
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CRISC Review Questions with correct answers
| | | | |




R1-1 |Which |of |the |following |is |MOST |important |to |determine |when |defining |risk |management
|strategies?



A. |Risk |assessment |criteria

B. |IT |architecture |complexity

C. |An |enterprise |disaster |recovery |plan

D. |Business |objectives |and |operations |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Information |on |the |internal |and |external |environment |must |be |collected |to |define |a |
strategy |and |identify |its

impact. |Risk |assessment |criteria |alone |are |not |sufficient.

B. |IT |architecture |complexity |is |more |directly |related |to |assessing |risk |than |defining |strategies.

C. |An |enterprise |disaster |recovery |plan |is |more |directly |related |to |mitigating |the |risk.

D. |While |defining |risk |management |strategies, |the |risk |practitioner |needs |to |analyze |the |
organization's

objectives |and |risk |tolerance |and |define |a |risk |management |framework |based |on |this |analysis.
|Some



organizations |may |accept |known |risk, |while |others |may |invest |in |and |apply |mitigating |controls |
to

reduce |risk.



R1-2 |Which |of |the |following |is |the |MOST |important |information |to |include |in |a |risk |
management |strategic |plan?

A. |Risk |management |staffing |requirements

B. |The |risk |management |mission |statement

C. |Risk |mitigation |investment |plans

,D. |The |current |state |and |desired |future |state |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Risk |management |staffing |requirements |are |generally |driven |by |a |robust |understanding |of |
the |current |and

desired |future |state.

B. |The |risk |management |mission |statement |is |important |but |is |not |an |actionable |part |of |a |risk
|management



strategic |plan.

C. |Risk |mitigation |investment |plans |are |generally |driven |by |a |robust |understanding |of |the |
current |and |desired

future |state.

D. |It |is |most |important |to |paint |a |vision |for |the |future |and |then |draw |a |road |map |from |the |
starting |point;

therefore, |this |requires |that |the |current |state |and |desired |future |state |be |fully |understood.



R1-3 |Information |that |is |no |longer |required |to |support |the |main |purpose |of |the |business |from
|an |information |security



perspective |should |be:

A. |analyzed |under |the |retention |policy.

B. |protected |under |the |information |classification |policy.

C. |analyzed |under |the |backup |policy.

D. |protected |under |the |business |impact |analysis. |- |correct |answer |A |is |the |correct |answer.

Justification:

A. |Information |that |is |no |longer |required |should |be |analyzed |under |the |retention |policy |to |
determine

whether |the |organization |is |required |to |maintain |the |data |for |business, |legal |or |regulatory |
reasons.

Keeping |data |that |are |no |longer |required |unnecessarily |consumes |resources; |may |be |in |breach
|of

,legal |and |regulatory |obligations |regarding |retention |of |data; |and, |in |the |case |of |sensitive |
personal

information, |can |increase |the |risk |of |data |compromise.

B. |The |information |classification |policy |should |specify |retention |and |destruction |of |information
|that |is |no |longer



of |value |to |the |core |business, |as |applicable.

C. |The |backup |policy |is |generally |based |on |recovery |point |objectives. |The |information |
classification |policy

should |specify |retention |and |destruction |of |backup |media.

D. |A |business |impact |analysis |can |help |determine |that |this |information |does |not |support |the |
main |objective |of |the

business, |but |does |not |indicate |the |action |to |take.



R1-4 |An |enterprise |has |outsourced |the |majority |of |its |IT |department |to |a |third |party |whose |
servers |are |in |a |foreign

country. |Which |of |the |following |is |the |MOST |critical |security |consideration?

A. |A |security |breach |notification |may |get |delayed |due |to |the |time |difference.

B. |Additional |network |intrusion |detection |sensors |should |be |installed, |resulting |in |additional |
cost.

C. |The |enterprise |could |be |unable |to |monitor |compliance |with |its |internal |security |and |privacy
|guidelines.



D. |Laws |and |regulations |of |the |country |of |origin |may |not |be |enforceable |in |the |foreign |
country. |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Security |breach |notification |is |not |a |problem. |Time |difference |does |not |play |a |role |in |a |24/7
|environment.



Mobile |devices |(smartphones, |tablets, |etc.) |are |usually |available |to |communicate |a |
notification.

B. |The |need |for |additional |network |intrusion |sensors |is |a |manageable |problem |that |requires |
additional |funding,

, but |can |be |addressed.

C. |Outsourcing |does |not |remove |the |enterprise's |responsibility |regarding |internal |
requirements.

D. |Laws |and |regulations |of |the |country |of |origin |may |not |be |enforceable |in |the |foreign |
country.

Conversely, |the |laws |and |regulations |of |the |foreign |vendor |may |also |affect |the |enterprise. |
Potential

violation |of |local |laws |applicable |to |the |enterprise |or |the |vendor |may |not |be |recognized |or |
remedied |due

to |the |lack |of |knowledge |of |local |laws |and/or |inability |to |enforce |them.



R1-5 |An |enterprise |recently |developed |a |breakthrough |technology |that |could |provide |a |
significant |competitive |edge.

Which |of |the |following |FIRST |governs |how |this |information |is |to |be |protected |from |within |the |
enterprise?

A. |The |data |classification |policy

B. |The |acceptable |use |policy

C. |Encryption |standards

D. |The |access |control |policy |- |correct |answer |A |is |the |correct |answer.

Justification:

A. |A |data |classification |policy |describes |the |data |classification |categories, |level |of |protection |to
|be |provided



for |each |category |of |data |and |roles |and |responsibilities |of |potential |users, |including |data |
owners.

B. |An |acceptable |use |policy |is |oriented |more |toward |the |end |user |and, |therefore, |does |not |
specifically |address

which |controls |should |be |in |place |to |adequately |protect |information.

C. |Mandated |levels |of |protection, |as |defined |by |the |data |classification |policy, |should |drive |
which |levels |of
$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor
Seller avatar
Lectpolly

Conoce al vendedor

Seller avatar
Lectpolly Chamberlain College Of Nursing
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
0
Miembro desde
4 meses
Número de seguidores
0
Documentos
36
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes