Isaca CRISC Practice Test - Questions Answers
List of questions
Question 1

The acceptance of control costs that exceed risk exposure is MOST likely an example of:
Question 2

Who is the MOST appropriate owner for newly identified IT risk?
Question 3

Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
Question 4

Calculation of the recovery time objective (RTO) is necessary to determine the:
Question 5

The PRIMARY objective for selecting risk response options is to:
Question 6

Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
Question 7

Which of the following would BEST help an enterprise prioritize risk scenarios?
Question 8

Which of the following would be a risk practitioners BEST recommendation for preventing cyber intrusion?
Question 9

Who should be accountable for ensuring effective cybersecurity controls are established?
Question 10

A contract associated with a cloud service provider MUST include:
Question