Try 12 Certified in Risk and Information Systems Control (CRISC) sample questions and practice-test preview prompts on IT risk identification, assessment, response, reporting, control design, and control monitoring.
Certified in Risk and Information Systems Control (CRISC) is ISACA’s enterprise IT risk credential. It is a good future QBank fit because candidates need to reason through risk scenarios, control options, monitoring, ownership, and reporting.
Use these 12 original sample questions for initial self-assessment. The full IT Mastery route for CRISC is not available yet; try the preview and use the Notify me form if this is your target route.
CRISC questions usually ask for a risk-management decision, not a purely technical control. Look for risk ownership, business impact, likelihood, control effectiveness, residual risk, and whether the response fits risk appetite.
These questions are original IT Mastery preview items for enterprise IT risk and control reasoning. They are not official ISACA exam questions.
Topic: risk identification
A new customer portal will connect to legacy billing data. What should the risk practitioner do first?
Best answer: B
Explanation: Risk identification starts by understanding the business process, assets, dependencies, threats, vulnerabilities, and possible impacts. Controls come after the risk is understood.
Topic: risk ownership
A business unit wants to accept residual risk above normal tolerance for a short-term launch. What should happen?
Best answer: D
Explanation: Risk decisions belong to accountable business authority. CRISC reasoning expects documentation, governance, and risk appetite alignment.
Topic: control design
A risk assessment shows high likelihood of unauthorized changes to a critical application. Which response is most directly aligned?
Best answer: A
Explanation: The control response should address the risk scenario. Authorization, segregation, logging, and monitoring reduce unauthorized change risk.
Topic: risk assessment
Two risks have similar likelihood, but one could stop revenue processing for two days. What should drive prioritization?
Best answer: C
Explanation: Risk assessment weighs impact and likelihood in business context. A revenue-processing outage can warrant higher priority even if likelihood is similar.
Topic: key risk indicators
Which metric is most useful as a key risk indicator for privileged-access risk?
Best answer: D
Explanation: A useful KRI signals risk exposure or control weakness. Unreviewed privileged accounts directly relate to privileged-access risk.
Topic: control monitoring
A control was designed to review firewall rules quarterly, but no reviews occurred for two quarters. What is the best conclusion?
Best answer: B
Explanation: Control design and control operation are different. If the review is not performed, the control may not reduce risk as expected.
Topic: risk response
A risk is above appetite, but the proposed control costs more than the expected loss and disrupts operations. What should the risk practitioner recommend?
Best answer: A
Explanation: Risk response should be proportionate and aligned to business context. Alternative treatments may reduce risk more efficiently.
Topic: reporting
Executives receive a list of 400 technical vulnerabilities with no business context. What is the main reporting weakness?
Best answer: C
Explanation: Risk reporting should support decisions. Technical detail must be translated into risk priority, impact, accountability, and response options.
Topic: third-party risk
A vendor hosts a business-critical service. What should be monitored after onboarding?
Best answer: D
Explanation: Third-party risk continues after onboarding. Monitoring should include performance, control evidence, incidents, obligations, and changing risk conditions.
Topic: residual risk
After multifactor authentication is implemented, account-takeover risk is reduced but not eliminated. What remains?
Best answer: B
Explanation: Controls reduce risk; they rarely eliminate it. Residual risk must be understood and accepted or treated according to governance.
Topic: control ownership
A control fails repeatedly because no team is accountable for performing it. What is the best response?
Best answer: A
Explanation: Controls need owners and operating expectations. Without accountability, monitoring and remediation are weak.
Topic: risk appetite
A risk metric exceeds the approved appetite threshold. What should happen?
Best answer: C
Explanation: Risk appetite thresholds exist to trigger governance action. Exceeding appetite should lead to escalation and a treatment decision.
| Area | What to check |
|---|---|
| Risk scenario | Identify asset, threat, vulnerability, event, impact, and owner. |
| Response | Match treatment to appetite, business impact, cost, and feasibility. |
| Controls | Separate control design from control operating effectiveness. |
| Reporting | Translate technical findings into decisions, owners, and business impact. |