CRISC FULL EXAM PRACTICE QUESTIONS
AND ASNWERS (100% Pass)
Which of the following is the MOST important reason for conducting security
awareness programs throughout
an enterprise?
A. Reducing the risk of a social engineering attack
B. Training personnel in security incident response
C. Informing business units about the security strategy
D. Maintaining evidence of training records to ensure compliance - Answer✔️✔️-A
Which of the following is MOST important to determine when defining risk
management strategies?
A. Risk assessment criteria
B. IT architecture complexity
C. An enterprise disaster recovery plan (DRP)
D. Organizational objectives - Answer✔️✔️-D
1
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
Which of the following is the MOST important information to include in a risk
management strategic plan?
A. Risk management staffing requirements
B. The risk management mission statement
C. Risk mitigation investment plans
D. The current state and desired future state - Answer✔️✔️-D
Information that is no longer required to support the main purpose of the business
from an information security
perspective should be:
A. analyzed under the retention policy.
B. protected under the information classification policy.
C. analyzed under the backup policy.
D. protected under the business impact analysis (BIA). - Answer✔️✔️-A
An enterprise has outsourced the majority of its IT department to a third party
whose servers are in a foreign
country. Which of the following is the MOST critical security consideration?
A. A security breach notification may get delayed due to the time difference.
2
,©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
B. Additional network intrusion detection sensors should be installed, resulting in
additional cost.
C. The enterprise could be unable to monitor compliance with its internal security
and privacy guidelines.
D. Laws and regulations of the country of origin may not be enforceable in the
foreign country. - Answer✔️✔️-D
An enterprise recently developed a breakthrough technology that could provide a
significant competitive edge.
Which of the following FIRST governs how this information is to be protected
from within the enterprise?
A. The data classification policy
B. The acceptable use policy
C. Encryption standards
D. The access control policy - Answer✔️✔️-A
Malware has been detected that redirects users' computers to web sites crafted
specifically for the purpose of fraud.
3
, ©PREP4EXAMS 2024/2025 REAL EXAM DUMPS Tuesday, August 6, 2024 10,57 AM
The malware changes domain name system (DNS) server settings, redirecting
users to sites under the hackers'
control. This scenario BEST describes a: - Answer✔️✔️-C
What is the MOST effective method to evaluate the potential impact of legal,
regulatory and contractual
requirements on business objectives?
A. A compliance-oriented gap analysis
B. Interviews with business process stakeholders
C. A mapping of compliance requirements to policies and procedures
D. A compliance-oriented business impact analysis (BIA) - Answer✔️✔️-D
Which of the following is the BEST way to ensure that an accurate risk register is
maintained over time?
A. Monitor key risk indicators (KRJs), and record the findings in the risk register.
B. Publish the risk register centrally with workflow features that periodically poll
risk assessors.
C. Distribute the risk register to business process owners for review and updating.
4