SlideShare una empresa de Scribd logo
1 de 8
Descargar para leer sin conexión
http://www.Officialcerts.com
CRISC
ISACA
Certified in Risk and Information Systems Control
http://www.officialcerts.com/exams.asp?examcode=CRISC
OfficialCerts.com is a reputable IT certification examination guide, study guides and
audio exam provider. We ensure that you pass your CRISC exam in first attempt
and also get high scores to acquire ISACA certification.
If you use OfficialCerts CRISC Certification questions and answers, you will experience
actual CRISC exam questions/answers. We know exactly what is needed and have all the exam
preparation material required to pass the exam. Our ISACA exam prep covers over 95% of the
questions and answers that may be appeared in your CRISC exam. Every point from pass4sure
CRISC PDF, CRISC review will help you take ISACA CRISC exam much easier
and become ISACA certified.
Here's what you can expect from the OfficialCerts ISACA CRISC course:
* Up-to-Date ISACA CRISC questions as experienced in the real exam.
* 100% correct ISACA CRISC answers you simply can't find in other CRISC courses.
* All of our tests are easy to download. Your file will be saved as a CRISC PDF.
* ISACA CRISC brain dump free content featuring the real CRISC test questions.
ISACA CRISC certification exam is of core importance both in your Professional
life and ISACA certification path. With ISACA certification you can get a good
job easily in the market and get on your path for success. Professionals who passed
ISACA CRISC exam training are an absolute favorite in the industry.
You will pass ISACA CRISC certification test and career opportunities will be
open for you.
Question: 1
Assessing the probability and consequences of identified risks to the project objectives, assigning a
risk score to each risk, and creating a list of prioritized risks describes which of the following
processes?
A. Identify Risks
B. Qualitative Risk Analysis
C. Quantitative Risk Analysis
D. Plan Risk Management
Answer: B
Explanation:
The purpose of qualitative risk analysis is to determine what impact the identified risk events will
have on the project and the probability they'll occur. It also puts risks in priority order according to
their effects on the project objectives and assigns a risk score for the project.
Answer: C is incorrect. This process does not involve assessing the probability and consequences of
identified risks.
Quantitative analysis is the use of numerical and statistical techniques rather than the analysis of
verbal material for analyzing risks. Some of the quantitative methods of risk analysis are:
Internal loss method
External data analysis
Business process modeling (BPM) and simulation
Statistical process control (SPC)
Answer: A is incorrect. It involves listing of all the possible risks so as to cure them before it can
occur. In risk identification both threats and opportunities are considered, as both carry some level
of risk with them.
Answer: D is incorrect. Risk Management is used to identify, assess, and control risks. It includes
analyzing the value of assets to the business, identifying threats to those assets, and evaluating how
vulnerable each asset is to those threats.
Assessing the probability and consequences of identified risks is only the part of risk management.
Question: 2
Which of the following characteristics of baseline represents specification that is used to identify
approved requirements in baseline modeling?
A. Functional
B. Allocated
C. Product
D. Developmental
Answer: B
CRISC
2 http://
Explanation:
In baseline modeling, the baseline can characterize the functional, allocated, developmental, and
product aspects of a solution. The allocated characteristic focus on the specifications which met the
requirements approved by management.
Answer: A, C, and D are incorrect. These characteristics do not represents specification that is used
to identify approved requirements in baseline modeling.
Question: 3
Which of the following variables are associated with quantitative assessment of risks?
Each correct answer represents a complete solution. Choose three.
A. Impact
B. Probability
C. Cost
D. Frequency
Answer: D, B, and A
Explanation:
The measurable data used by this assessment include frequency, probability, impact, and
effectiveness of countermeasures.
Risk assessment is a process of analyzing the identified risk, both quantitatively and qualitatively.
Quantitative risk assessment requires calculations of two components of risk, the magnitude of the
potential loss, and the probability that the loss will occur. While qualitatively risk assessment checks
the severity of risk. The assessment attempts to determine the likelihood of the risk being realized
and the impact of the risk on the operation. This provides several conclusions :
Probability-establishing the likelihood of occurrence and reoccurrence of specific risks,
independently and combined.
Interdependencies-the relationship between different types of risk. For instance, one risk may have
greater potential of occurring if another risk has occurred. Or probability or impact of a situation
may increase with combined risk.
Question: 4
Which of the following laws applies to organizations handling health care information?
A. SOX
B. GLBA
C. HIPAA
D. FISMA
Answer: C
CRISC
3 http://
Explanation:
HIPAA handles health care information of an organization.
The Health Insurance Portability and Accountability Act (HIPAA) were introduced in 1996. It ensures
that health information data is protected. Before HIPAA, personal medical information was often
available to anyone. Security to protect the data was lax, and the data was often misused.
If your organization handles health information, HIPAA applies. HIPAA defines health information as
any data that is created or received by health care providers, health plans, public health authorities,
employers, life insurers, schools or universities, and health care clearinghouses.
HIPAA defines any data that is related to the health of an individual, including past/present/future
health, physical/mental health, and past/present/future payments for health care.
Creating a HIPAA compliance plan involves following phases:
Assessment: An assessment helps in identifying whether organization is covered by HIPAA. If it is,
then further requirement is to identify what data is needed to protect.
Risk analysis: A risk analysis helps to identify the risks. In this phase, analyzing method of handling
data of organization is done.
Plan creation: After identifying the risks, plan is created. This plan includes methods to reduce the
risk.
Plan implementation: In this plan is being implemented.
Continuous monitoring: Security in depth requires continuous monitoring. Monitor regulations for
changes. Monitor risks for changes.
Monitor the plan to ensure it is still used.
Assessment: Regular reviews are conducted to ensure that the organization remains in compliance.
Answer: A is incorrect. SOX designed to hold executives and board members personally responsible
for financial data.
Answer: B is incorrect. GLBA is not used for handling health care information.
Answer: D is incorrect. FISMA ensures protection of data of federal agencies.
Question: 5
You are the project manager of GRT project. You discovered that by bringing on more qualified
resources or by providing even better quality than originally planned, could result in reducing the
amount of time required to complete the project. If your organization seizes this opportunity it
would be an example of what risk response?
A. Share
B. Enhance
C. Exploit
D. Accept
Answer: C
Explanation:
Exploit response is one of the strategies to negate risks or threats that appear in a project. This
strategy may be selected for risks with positive impacts where the organization wishes to ensure
CRISC
4 http://
5
that the opportunity is realized. Exploiting a risk event provides opportunities for positive impact on
a project. Assigning more talented resources to the project to reduce the time to completion is an
example of exploit response.
Answer: A is incorrect. - The share strategy is similar as transfer because in this a portion of the risk
is shared with an external organization or another internal entity.
Answer: B is incorrect. The enhance strategy closely watches the probability or impact of the risk
event to assure that the organization realizes the benefits. The primary point of this strategy is to
attempt to increase the probability and/or impact of positive risks.
Answer: D is incorrect. Risk acceptance means that no action is taken relative to a particular risk; loss
is accepted if it occurs.
Question: 6
You are the project manager of the NHQ project in Bluewell Inc. The project has an asset valued at
$200,000 and is subjected to an exposure factor of 45 percent. If the annual rate of occurrence of
loss in this project is once a month, then what will be the Annual Loss Expectancy (ALE) of the
project?
A. $ 2,160,000
B. $ 95,000
C. $ 90,000
D. $ 108,000
Answer: D
Explanation:
The ALE of this project will be $ 108,000.
Single Loss Expectancy is a term related to Quantitative Risk Assessment. It can be defined as the
monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as
follows:
SLE = Asset value * Exposure factor
Therefore,
SLE = 200,000 * 0.45
= $ 90,000
As the loss is occurring once every month, therefore ARO is 12. Now ALE can be calculated as
follows:
ALE = SLE * ARO
= 90,000 * 12
= $ 108,000
CRISC
5 http://
Question: 7
Which of the following is NOT true for Key Risk Indicators?
A. The complete set of KRIs should also balance indicators for risk, root causes and business
impact.
B. They help avoid having to manage and report on an excessively large number of risk indicators
C. They are monitored annually
D. They are selected as the prime monitoring indicators for the enterprise
Answer: C
Explanation:
They are monitored on regular basis as they indicate high probability and high impact risks. As risks
change over time, hence KRIs should also be monitored regularly for its effectiveness on these
changing risks.
Answer: D, B, and A are incorrect. These all are true for KRIs. Key Risk Indicators are the prime
monitoring indicators of the enterprise. KRIs are highly relevant and possess a high probability of
predicting or indicating important risk. KRIs help in avoiding excessively large number of risk
indicators to manage and report that a large enterprise may have.
The complete set of KRIs should also balance indicators for risk, root causes and business impact, so
as to indicate the risk and its impact completely.
Question: 8
You work as a project manager for SoftTech Inc. You are working with the project stakeholders to
begin the qualitative risk analysis process.
Which of the following inputs will be needed for the qualitative risk analysis process in your project?
Each correct answer represents a complete solution. Choose all that apply.
A. Cost management plan
B. Organizational process assets
C. Project scope statement
D. Risk register
Answer: D, B, and C
Explanation:
The primary goal of qualitative risk analysis is to determine proportion of effect and theoretical
response. The inputs to the Qualitative Risk Analysis process are:
Organizational process assets
CRISC
6 http://
Project Scope Statement
Risk Management Plan
Risk Register
Answer: A is incorrect. The cost management plan is the input to the perform quantitative risk
analysis process.
Question: 9
You have identified several risks in your project. You have opted for risk mitigation in order to
respond to identified risk. Which of the following ensures that risk mitigation method that you have
chosen is effective?
A. Reduction in the frequency of a threat
B. Minimization of inherent risk
C. Reduction in the impact of a threat
D. Minimization of residual risk
Answer: B
Explanation:
The inherent risk of a process is a given and cannot be affected by risk reduction or risk mitigation
efforts. Hence it should be reduced as far as possible.
Answer: D is incorrect. The objective of risk reduction is to reduce the residual risk to levels below
the enterprise's risk tolerance level.
Answer: A is incorrect. Risk reduction efforts can focus on either avoiding the frequency of the risk or
reducing the impact of a risk.
Answer: C is incorrect. Risk reduction efforts can focus on either avoiding the frequency of the risk or
reducing the impact of a risk.
Question: 10
Which of the following methods involves the use of predictive or diagnostic analytical tool for
exposing risk factors?
A. Fault tree analysis
B. Scenario analysis
C. Sensitivity analysis
D. Cause and effect analysis
Answer: D
Explanation:
CRISC
7 http://
OfficialCerts.com Certification Exam Full Version Features;
- Verified answers researched by industry experts.
- Exams updated on regular basis.
- Questions, Answers are downloadable in PDF format.
- No authorization code required to open exam.
- Portable anywhere.
- 100% success Guarantee.
- Fast, helpful support 24x7.
View list of All exams we offer;
http://www.officialcerts.com/allexams.asp
To contact our Support;
http://www.officialcerts.com/support.asp
View FAQs
http://www.officialcerts.com/faq.asp
Download All Exams Samples
http://www.officialcerts.com/samples.asp
To purchase Full Version and updated exam;
http://www.officialcerts.com/allexams.asp
3COM CompTIA Filemaker IBM LPI OMG Sun
ADOBE ComputerAssociates Fortinet IISFA McAfee Oracle Sybase
APC CWNP Foundry Intel McData PMI Symantec
Apple DELL Fujitsu ISACA Microsoft Polycom TeraData
BEA ECCouncil GuidanceSoftware ISC2 Mile2 RedHat TIA
BICSI EMC HDI ISEB NetworkAppliance Sair Tibco
CheckPoint Enterasys Hitachi ISM Network-General SASInstitute TruSecure
Cisco ExamExpress HP Juniper Nokia SCP Veritas
Citrix Exin Huawei Legato Nortel See-Beyond Vmware
CIW ExtremeNetworks Hyperion Lotus Novell Google
End of DEMO

Más contenido relacionado

La actualidad más candente

CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
Cyril Soeri
 
Operational risk & business continuity management
Operational risk & business continuity managementOperational risk & business continuity management
Operational risk & business continuity management
Ujjwal 'Shanu'
 

La actualidad más candente (20)

Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
GRC Software Implementation Strategy
GRC Software Implementation StrategyGRC Software Implementation Strategy
GRC Software Implementation Strategy
 
IT Audit - Shadow IT Systems
IT Audit - Shadow IT SystemsIT Audit - Shadow IT Systems
IT Audit - Shadow IT Systems
 
NIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmapNIST - Cybersecurity Framework mindmap
NIST - Cybersecurity Framework mindmap
 
Menyusun Manajemen Risiko_Hadi Cahyono
Menyusun Manajemen Risiko_Hadi CahyonoMenyusun Manajemen Risiko_Hadi Cahyono
Menyusun Manajemen Risiko_Hadi Cahyono
 
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging RisksC-Suite’s Guide to Enterprise Risk Management and Emerging Risks
C-Suite’s Guide to Enterprise Risk Management and Emerging Risks
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You..."Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
"Threat Model Every Story": Practical Continuous Threat Modeling Work for You...
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
Operational risk & business continuity management
Operational risk & business continuity managementOperational risk & business continuity management
Operational risk & business continuity management
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
Cybersecurity Maturity Model Certification
Cybersecurity Maturity Model CertificationCybersecurity Maturity Model Certification
Cybersecurity Maturity Model Certification
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and DifferencesCMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
CMMC, ISO/IEC 27701, and ISO/IEC 27001 — Best Practices and Differences
 
Cisa domain 1
Cisa domain 1 Cisa domain 1
Cisa domain 1
 
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk MethodologyPECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
PECB Webinar: Aligning ISO 31000 and Management of Risk Methodology
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 

Destacado

Destacado (15)

COBIT®5 - Assessor
COBIT®5 - AssessorCOBIT®5 - Assessor
COBIT®5 - Assessor
 
COBIT®5 - Implementation
COBIT®5 - ImplementationCOBIT®5 - Implementation
COBIT®5 - Implementation
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
COBIT®5 - Foundation
COBIT®5 - FoundationCOBIT®5 - Foundation
COBIT®5 - Foundation
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Sourcing Governance - Foundation
Sourcing Governance - FoundationSourcing Governance - Foundation
Sourcing Governance - Foundation
 
[Cluj] Turn SSL ON
[Cluj] Turn SSL ON[Cluj] Turn SSL ON
[Cluj] Turn SSL ON
 
Study Notes - COBIT 5 Foundation Certification
Study Notes - COBIT 5 Foundation CertificationStudy Notes - COBIT 5 Foundation Certification
Study Notes - COBIT 5 Foundation Certification
 
Effective COBIT 5 Foundation Course Materials
Effective COBIT 5 Foundation Course MaterialsEffective COBIT 5 Foundation Course Materials
Effective COBIT 5 Foundation Course Materials
 
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate ServicesInfrastructure Saturday 2011 - Understanding PKI and Certificate Services
Infrastructure Saturday 2011 - Understanding PKI and Certificate Services
 
Cobit 5 - An Overview
Cobit 5 - An OverviewCobit 5 - An Overview
Cobit 5 - An Overview
 
Cism course ppt
Cism course pptCism course ppt
Cism course ppt
 
SDI - SDA - Service Desk Analyst
SDI - SDA - Service Desk AnalystSDI - SDA - Service Desk Analyst
SDI - SDA - Service Desk Analyst
 
CHAMPS2 - Foundation
CHAMPS2 - FoundationCHAMPS2 - Foundation
CHAMPS2 - Foundation
 
CismPrepGuide
CismPrepGuideCismPrepGuide
CismPrepGuide
 

Similar a CRISC Exam Questions

Question 1 According to the textbook, risk management plans ad.docx
Question 1 According to the textbook, risk management plans ad.docxQuestion 1 According to the textbook, risk management plans ad.docx
Question 1 According to the textbook, risk management plans ad.docx
IRESH3
 
Quiz on Risk Management (Insurance)
Quiz on Risk Management (Insurance)Quiz on Risk Management (Insurance)
Quiz on Risk Management (Insurance)
Saumya Singh
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
Paul Hunt
 
18 .docx
18                                  .docx18                                  .docx
18 .docx
drennanmicah
 

Similar a CRISC Exam Questions (20)

CRISC Exam Questions
CRISC Exam QuestionsCRISC Exam Questions
CRISC Exam Questions
 
Risk 4 simplelearn-exam3-ans
Risk 4 simplelearn-exam3-ansRisk 4 simplelearn-exam3-ans
Risk 4 simplelearn-exam3-ans
 
Pmi rmp
Pmi rmpPmi rmp
Pmi rmp
 
Risk 1 actual test 7 (273 q)
Risk 1 actual test 7 (273 q)Risk 1 actual test 7 (273 q)
Risk 1 actual test 7 (273 q)
 
PMI-RMP a test mod 00
PMI-RMP a test  mod 00PMI-RMP a test  mod 00
PMI-RMP a test mod 00
 
Risk 2 simplelearn-exam1-ans
Risk 2 simplelearn-exam1-ansRisk 2 simplelearn-exam1-ans
Risk 2 simplelearn-exam1-ans
 
Risk 5 simplelearn-exam4-ans
Risk 5 simplelearn-exam4-ansRisk 5 simplelearn-exam4-ans
Risk 5 simplelearn-exam4-ans
 
Question 1 According to the textbook, risk management plans ad.docx
Question 1 According to the textbook, risk management plans ad.docxQuestion 1 According to the textbook, risk management plans ad.docx
Question 1 According to the textbook, risk management plans ad.docx
 
PMP Sample Questions Set 2
PMP Sample Questions Set 2PMP Sample Questions Set 2
PMP Sample Questions Set 2
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Csslp
CsslpCsslp
Csslp
 
CHC Questions Answers PDF Dumps - Your Path to CHC Certification
CHC Questions Answers PDF Dumps - Your Path to CHC CertificationCHC Questions Answers PDF Dumps - Your Path to CHC Certification
CHC Questions Answers PDF Dumps - Your Path to CHC Certification
 
Quiz on Risk Management (Insurance)
Quiz on Risk Management (Insurance)Quiz on Risk Management (Insurance)
Quiz on Risk Management (Insurance)
 
Pmp sample questions set2
Pmp sample questions set2Pmp sample questions set2
Pmp sample questions set2
 
Pm0016 set-1
Pm0016 set-1Pm0016 set-1
Pm0016 set-1
 
An introduction to finance
An introduction to financeAn introduction to finance
An introduction to finance
 
Risk 9-pm study project risk management-test
Risk 9-pm study project risk management-testRisk 9-pm study project risk management-test
Risk 9-pm study project risk management-test
 
Pm study project risk management test
Pm study project  risk management testPm study project  risk management test
Pm study project risk management test
 
اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222اهم برزنتيشن لجنك2222
اهم برزنتيشن لجنك2222
 
18 .docx
18                                  .docx18                                  .docx
18 .docx
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

CRISC Exam Questions

  • 1. http://www.Officialcerts.com CRISC ISACA Certified in Risk and Information Systems Control http://www.officialcerts.com/exams.asp?examcode=CRISC OfficialCerts.com is a reputable IT certification examination guide, study guides and audio exam provider. We ensure that you pass your CRISC exam in first attempt and also get high scores to acquire ISACA certification. If you use OfficialCerts CRISC Certification questions and answers, you will experience actual CRISC exam questions/answers. We know exactly what is needed and have all the exam preparation material required to pass the exam. Our ISACA exam prep covers over 95% of the questions and answers that may be appeared in your CRISC exam. Every point from pass4sure CRISC PDF, CRISC review will help you take ISACA CRISC exam much easier and become ISACA certified. Here's what you can expect from the OfficialCerts ISACA CRISC course: * Up-to-Date ISACA CRISC questions as experienced in the real exam. * 100% correct ISACA CRISC answers you simply can't find in other CRISC courses. * All of our tests are easy to download. Your file will be saved as a CRISC PDF. * ISACA CRISC brain dump free content featuring the real CRISC test questions. ISACA CRISC certification exam is of core importance both in your Professional life and ISACA certification path. With ISACA certification you can get a good job easily in the market and get on your path for success. Professionals who passed ISACA CRISC exam training are an absolute favorite in the industry. You will pass ISACA CRISC certification test and career opportunities will be open for you.
  • 2. Question: 1 Assessing the probability and consequences of identified risks to the project objectives, assigning a risk score to each risk, and creating a list of prioritized risks describes which of the following processes? A. Identify Risks B. Qualitative Risk Analysis C. Quantitative Risk Analysis D. Plan Risk Management Answer: B Explanation: The purpose of qualitative risk analysis is to determine what impact the identified risk events will have on the project and the probability they'll occur. It also puts risks in priority order according to their effects on the project objectives and assigns a risk score for the project. Answer: C is incorrect. This process does not involve assessing the probability and consequences of identified risks. Quantitative analysis is the use of numerical and statistical techniques rather than the analysis of verbal material for analyzing risks. Some of the quantitative methods of risk analysis are: Internal loss method External data analysis Business process modeling (BPM) and simulation Statistical process control (SPC) Answer: A is incorrect. It involves listing of all the possible risks so as to cure them before it can occur. In risk identification both threats and opportunities are considered, as both carry some level of risk with them. Answer: D is incorrect. Risk Management is used to identify, assess, and control risks. It includes analyzing the value of assets to the business, identifying threats to those assets, and evaluating how vulnerable each asset is to those threats. Assessing the probability and consequences of identified risks is only the part of risk management. Question: 2 Which of the following characteristics of baseline represents specification that is used to identify approved requirements in baseline modeling? A. Functional B. Allocated C. Product D. Developmental Answer: B CRISC 2 http://
  • 3. Explanation: In baseline modeling, the baseline can characterize the functional, allocated, developmental, and product aspects of a solution. The allocated characteristic focus on the specifications which met the requirements approved by management. Answer: A, C, and D are incorrect. These characteristics do not represents specification that is used to identify approved requirements in baseline modeling. Question: 3 Which of the following variables are associated with quantitative assessment of risks? Each correct answer represents a complete solution. Choose three. A. Impact B. Probability C. Cost D. Frequency Answer: D, B, and A Explanation: The measurable data used by this assessment include frequency, probability, impact, and effectiveness of countermeasures. Risk assessment is a process of analyzing the identified risk, both quantitatively and qualitatively. Quantitative risk assessment requires calculations of two components of risk, the magnitude of the potential loss, and the probability that the loss will occur. While qualitatively risk assessment checks the severity of risk. The assessment attempts to determine the likelihood of the risk being realized and the impact of the risk on the operation. This provides several conclusions : Probability-establishing the likelihood of occurrence and reoccurrence of specific risks, independently and combined. Interdependencies-the relationship between different types of risk. For instance, one risk may have greater potential of occurring if another risk has occurred. Or probability or impact of a situation may increase with combined risk. Question: 4 Which of the following laws applies to organizations handling health care information? A. SOX B. GLBA C. HIPAA D. FISMA Answer: C CRISC 3 http://
  • 4. Explanation: HIPAA handles health care information of an organization. The Health Insurance Portability and Accountability Act (HIPAA) were introduced in 1996. It ensures that health information data is protected. Before HIPAA, personal medical information was often available to anyone. Security to protect the data was lax, and the data was often misused. If your organization handles health information, HIPAA applies. HIPAA defines health information as any data that is created or received by health care providers, health plans, public health authorities, employers, life insurers, schools or universities, and health care clearinghouses. HIPAA defines any data that is related to the health of an individual, including past/present/future health, physical/mental health, and past/present/future payments for health care. Creating a HIPAA compliance plan involves following phases: Assessment: An assessment helps in identifying whether organization is covered by HIPAA. If it is, then further requirement is to identify what data is needed to protect. Risk analysis: A risk analysis helps to identify the risks. In this phase, analyzing method of handling data of organization is done. Plan creation: After identifying the risks, plan is created. This plan includes methods to reduce the risk. Plan implementation: In this plan is being implemented. Continuous monitoring: Security in depth requires continuous monitoring. Monitor regulations for changes. Monitor risks for changes. Monitor the plan to ensure it is still used. Assessment: Regular reviews are conducted to ensure that the organization remains in compliance. Answer: A is incorrect. SOX designed to hold executives and board members personally responsible for financial data. Answer: B is incorrect. GLBA is not used for handling health care information. Answer: D is incorrect. FISMA ensures protection of data of federal agencies. Question: 5 You are the project manager of GRT project. You discovered that by bringing on more qualified resources or by providing even better quality than originally planned, could result in reducing the amount of time required to complete the project. If your organization seizes this opportunity it would be an example of what risk response? A. Share B. Enhance C. Exploit D. Accept Answer: C Explanation: Exploit response is one of the strategies to negate risks or threats that appear in a project. This strategy may be selected for risks with positive impacts where the organization wishes to ensure CRISC 4 http://
  • 5. 5 that the opportunity is realized. Exploiting a risk event provides opportunities for positive impact on a project. Assigning more talented resources to the project to reduce the time to completion is an example of exploit response. Answer: A is incorrect. - The share strategy is similar as transfer because in this a portion of the risk is shared with an external organization or another internal entity. Answer: B is incorrect. The enhance strategy closely watches the probability or impact of the risk event to assure that the organization realizes the benefits. The primary point of this strategy is to attempt to increase the probability and/or impact of positive risks. Answer: D is incorrect. Risk acceptance means that no action is taken relative to a particular risk; loss is accepted if it occurs. Question: 6 You are the project manager of the NHQ project in Bluewell Inc. The project has an asset valued at $200,000 and is subjected to an exposure factor of 45 percent. If the annual rate of occurrence of loss in this project is once a month, then what will be the Annual Loss Expectancy (ALE) of the project? A. $ 2,160,000 B. $ 95,000 C. $ 90,000 D. $ 108,000 Answer: D Explanation: The ALE of this project will be $ 108,000. Single Loss Expectancy is a term related to Quantitative Risk Assessment. It can be defined as the monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as follows: SLE = Asset value * Exposure factor Therefore, SLE = 200,000 * 0.45 = $ 90,000 As the loss is occurring once every month, therefore ARO is 12. Now ALE can be calculated as follows: ALE = SLE * ARO = 90,000 * 12 = $ 108,000 CRISC 5 http://
  • 6. Question: 7 Which of the following is NOT true for Key Risk Indicators? A. The complete set of KRIs should also balance indicators for risk, root causes and business impact. B. They help avoid having to manage and report on an excessively large number of risk indicators C. They are monitored annually D. They are selected as the prime monitoring indicators for the enterprise Answer: C Explanation: They are monitored on regular basis as they indicate high probability and high impact risks. As risks change over time, hence KRIs should also be monitored regularly for its effectiveness on these changing risks. Answer: D, B, and A are incorrect. These all are true for KRIs. Key Risk Indicators are the prime monitoring indicators of the enterprise. KRIs are highly relevant and possess a high probability of predicting or indicating important risk. KRIs help in avoiding excessively large number of risk indicators to manage and report that a large enterprise may have. The complete set of KRIs should also balance indicators for risk, root causes and business impact, so as to indicate the risk and its impact completely. Question: 8 You work as a project manager for SoftTech Inc. You are working with the project stakeholders to begin the qualitative risk analysis process. Which of the following inputs will be needed for the qualitative risk analysis process in your project? Each correct answer represents a complete solution. Choose all that apply. A. Cost management plan B. Organizational process assets C. Project scope statement D. Risk register Answer: D, B, and C Explanation: The primary goal of qualitative risk analysis is to determine proportion of effect and theoretical response. The inputs to the Qualitative Risk Analysis process are: Organizational process assets CRISC 6 http://
  • 7. Project Scope Statement Risk Management Plan Risk Register Answer: A is incorrect. The cost management plan is the input to the perform quantitative risk analysis process. Question: 9 You have identified several risks in your project. You have opted for risk mitigation in order to respond to identified risk. Which of the following ensures that risk mitigation method that you have chosen is effective? A. Reduction in the frequency of a threat B. Minimization of inherent risk C. Reduction in the impact of a threat D. Minimization of residual risk Answer: B Explanation: The inherent risk of a process is a given and cannot be affected by risk reduction or risk mitigation efforts. Hence it should be reduced as far as possible. Answer: D is incorrect. The objective of risk reduction is to reduce the residual risk to levels below the enterprise's risk tolerance level. Answer: A is incorrect. Risk reduction efforts can focus on either avoiding the frequency of the risk or reducing the impact of a risk. Answer: C is incorrect. Risk reduction efforts can focus on either avoiding the frequency of the risk or reducing the impact of a risk. Question: 10 Which of the following methods involves the use of predictive or diagnostic analytical tool for exposing risk factors? A. Fault tree analysis B. Scenario analysis C. Sensitivity analysis D. Cause and effect analysis Answer: D Explanation: CRISC 7 http://
  • 8. OfficialCerts.com Certification Exam Full Version Features; - Verified answers researched by industry experts. - Exams updated on regular basis. - Questions, Answers are downloadable in PDF format. - No authorization code required to open exam. - Portable anywhere. - 100% success Guarantee. - Fast, helpful support 24x7. View list of All exams we offer; http://www.officialcerts.com/allexams.asp To contact our Support; http://www.officialcerts.com/support.asp View FAQs http://www.officialcerts.com/faq.asp Download All Exams Samples http://www.officialcerts.com/samples.asp To purchase Full Version and updated exam; http://www.officialcerts.com/allexams.asp 3COM CompTIA Filemaker IBM LPI OMG Sun ADOBE ComputerAssociates Fortinet IISFA McAfee Oracle Sybase APC CWNP Foundry Intel McData PMI Symantec Apple DELL Fujitsu ISACA Microsoft Polycom TeraData BEA ECCouncil GuidanceSoftware ISC2 Mile2 RedHat TIA BICSI EMC HDI ISEB NetworkAppliance Sair Tibco CheckPoint Enterasys Hitachi ISM Network-General SASInstitute TruSecure Cisco ExamExpress HP Juniper Nokia SCP Veritas Citrix Exin Huawei Legato Nortel See-Beyond Vmware CIW ExtremeNetworks Hyperion Lotus Novell Google End of DEMO