Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4.2 TrustPilot
logo-home
Examen

CRISC Review Questions with correct answers

Note
-
Vendu
-
Pages
118
Grade
A+
Publié le
12-10-2025
Écrit en
2025/2026

CRISC Review Questions with correct answers

Établissement
CRISC
Cours
CRISC











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
CRISC
Cours
CRISC

Infos sur le Document

Publié le
12 octobre 2025
Nombre de pages
118
Écrit en
2025/2026
Type
Examen
Contient
Questions et réponses

Sujets

Aperçu du contenu

CRISC Review Questions with correct answers
| | | | |




R1-1 |Which |of |the |following |is |MOST |important |to |determine |when |defining |risk |management
|strategies?



A. |Risk |assessment |criteria

B. |IT |architecture |complexity

C. |An |enterprise |disaster |recovery |plan

D. |Business |objectives |and |operations |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Information |on |the |internal |and |external |environment |must |be |collected |to |define |a |
strategy |and |identify |its

impact. |Risk |assessment |criteria |alone |are |not |sufficient.

B. |IT |architecture |complexity |is |more |directly |related |to |assessing |risk |than |defining |strategies.

C. |An |enterprise |disaster |recovery |plan |is |more |directly |related |to |mitigating |the |risk.

D. |While |defining |risk |management |strategies, |the |risk |practitioner |needs |to |analyze |the |
organization's

objectives |and |risk |tolerance |and |define |a |risk |management |framework |based |on |this |analysis.
|Some



organizations |may |accept |known |risk, |while |others |may |invest |in |and |apply |mitigating |controls |
to

reduce |risk.



R1-2 |Which |of |the |following |is |the |MOST |important |information |to |include |in |a |risk |
management |strategic |plan?

A. |Risk |management |staffing |requirements

B. |The |risk |management |mission |statement

C. |Risk |mitigation |investment |plans

,D. |The |current |state |and |desired |future |state |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Risk |management |staffing |requirements |are |generally |driven |by |a |robust |understanding |of |
the |current |and

desired |future |state.

B. |The |risk |management |mission |statement |is |important |but |is |not |an |actionable |part |of |a |risk
|management



strategic |plan.

C. |Risk |mitigation |investment |plans |are |generally |driven |by |a |robust |understanding |of |the |
current |and |desired

future |state.

D. |It |is |most |important |to |paint |a |vision |for |the |future |and |then |draw |a |road |map |from |the |
starting |point;

therefore, |this |requires |that |the |current |state |and |desired |future |state |be |fully |understood.



R1-3 |Information |that |is |no |longer |required |to |support |the |main |purpose |of |the |business |from
|an |information |security



perspective |should |be:

A. |analyzed |under |the |retention |policy.

B. |protected |under |the |information |classification |policy.

C. |analyzed |under |the |backup |policy.

D. |protected |under |the |business |impact |analysis. |- |correct |answer |A |is |the |correct |answer.

Justification:

A. |Information |that |is |no |longer |required |should |be |analyzed |under |the |retention |policy |to |
determine

whether |the |organization |is |required |to |maintain |the |data |for |business, |legal |or |regulatory |
reasons.

Keeping |data |that |are |no |longer |required |unnecessarily |consumes |resources; |may |be |in |breach
|of

,legal |and |regulatory |obligations |regarding |retention |of |data; |and, |in |the |case |of |sensitive |
personal

information, |can |increase |the |risk |of |data |compromise.

B. |The |information |classification |policy |should |specify |retention |and |destruction |of |information
|that |is |no |longer



of |value |to |the |core |business, |as |applicable.

C. |The |backup |policy |is |generally |based |on |recovery |point |objectives. |The |information |
classification |policy

should |specify |retention |and |destruction |of |backup |media.

D. |A |business |impact |analysis |can |help |determine |that |this |information |does |not |support |the |
main |objective |of |the

business, |but |does |not |indicate |the |action |to |take.



R1-4 |An |enterprise |has |outsourced |the |majority |of |its |IT |department |to |a |third |party |whose |
servers |are |in |a |foreign

country. |Which |of |the |following |is |the |MOST |critical |security |consideration?

A. |A |security |breach |notification |may |get |delayed |due |to |the |time |difference.

B. |Additional |network |intrusion |detection |sensors |should |be |installed, |resulting |in |additional |
cost.

C. |The |enterprise |could |be |unable |to |monitor |compliance |with |its |internal |security |and |privacy
|guidelines.



D. |Laws |and |regulations |of |the |country |of |origin |may |not |be |enforceable |in |the |foreign |
country. |- |correct |answer |D |is |the |correct |answer.

Justification:

A. |Security |breach |notification |is |not |a |problem. |Time |difference |does |not |play |a |role |in |a |24/7
|environment.



Mobile |devices |(smartphones, |tablets, |etc.) |are |usually |available |to |communicate |a |
notification.

B. |The |need |for |additional |network |intrusion |sensors |is |a |manageable |problem |that |requires |
additional |funding,

, but |can |be |addressed.

C. |Outsourcing |does |not |remove |the |enterprise's |responsibility |regarding |internal |
requirements.

D. |Laws |and |regulations |of |the |country |of |origin |may |not |be |enforceable |in |the |foreign |
country.

Conversely, |the |laws |and |regulations |of |the |foreign |vendor |may |also |affect |the |enterprise. |
Potential

violation |of |local |laws |applicable |to |the |enterprise |or |the |vendor |may |not |be |recognized |or |
remedied |due

to |the |lack |of |knowledge |of |local |laws |and/or |inability |to |enforce |them.



R1-5 |An |enterprise |recently |developed |a |breakthrough |technology |that |could |provide |a |
significant |competitive |edge.

Which |of |the |following |FIRST |governs |how |this |information |is |to |be |protected |from |within |the |
enterprise?

A. |The |data |classification |policy

B. |The |acceptable |use |policy

C. |Encryption |standards

D. |The |access |control |policy |- |correct |answer |A |is |the |correct |answer.

Justification:

A. |A |data |classification |policy |describes |the |data |classification |categories, |level |of |protection |to
|be |provided



for |each |category |of |data |and |roles |and |responsibilities |of |potential |users, |including |data |
owners.

B. |An |acceptable |use |policy |is |oriented |more |toward |the |end |user |and, |therefore, |does |not |
specifically |address

which |controls |should |be |in |place |to |adequately |protect |information.

C. |Mandated |levels |of |protection, |as |defined |by |the |data |classification |policy, |should |drive |
which |levels |of
€12,68
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
Lectpolly

Faites connaissance avec le vendeur

Seller avatar
Lectpolly Chamberlain College Of Nursing
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
0
Membre depuis
4 mois
Nombre de followers
0
Documents
36
Dernière vente
-

0,0

0 revues

5
0
4
0
3
0
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions