Inspirational journeys

Follow the stories of academics and their research expeditions

CRISC—Certified in Risk and Information Systems Control Certification Questions and answer - Part 47

Mary Smith

Thu, 16 Apr 2026

CRISC—Certified in Risk and Information Systems Control Certification Questions and answer - Part 47

1. You are the project manager of the GHY Project for your company. You need to complete a project management process that will be on the lookout for new risks, changing risks, and risks that are now outdated. Which project management process is responsible for these actions?

A) Risk planning
B) Risk monitoring and controlling
C) Risk identification
D) Risk analysis



2. You are the project manager of the HGT project in Bluewell Inc. The project has an asset valued at $125,000 and is subjected to an exposure factor of 25 percent.What will be the Single Loss Expectancy of this project?

A) $125,025
B) $31,250
C) $5,000
D) $3,125,000



3. Which of the following are the principles of access controls?Each correct answer represents a complete solution. Choose three.(Select 3answers)

A) Confidentiality
B) Availability
C) Reliability
D) Integrity



4. You are the project manager of GHT project. You have selected appropriate Key Risk Indicators for your project. Now, you need to maintain those Key RiskIndicators. What is the MOST important reason to maintain Key Risk Indicators?

A) Risk reports need to be timely
B) Complex metrics require fine-tuning
C) Threats and vulnerabilities change over time
D) They help to avoid risk



5. Which of the following controls do NOT come under technical class of control?

A) Program management control
B) System and Communications Protection control
C) Identification and Authentication control
D) Access Control



1. Right Answer: B
Explanation: The risk monitoring and controlling is responsible for identifying new risks, determining the status of risks that may have changed, and determining which risks may be outdated in the project.Incorrect Answers:A: Risk planning creates the risk management plan and determines how risks will be identified, analyzed, monitored and controlled, and responded to.C: Risk identification is a process that identifies risk events in the project.D: Risk analysis helps determine the severity of the risk events, the risks' priority, and the probability and impact of risks.

2. Right Answer: B
Explanation: The Single Loss Expectancy (SLE) of this project will be $31,250.Single Loss Expectancy is a term related to Quantitative Risk Assessment. It can be defined as the monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as follows:Single Loss Expectancy (SLE) = Asset Value (AV) * Exposure Factor (EF) where the Exposure Factor represents the impact of the risk over the asset, or percentage of asset lost. As an example, if the Asset Value is reduced two third, the exposure factor value is .66. If the asset is completely lost, the Exposure Factor is 1.0. The result is a monetary value in the same unit as the Single LossExpectancy is expressed.Therefore,SLE = Asset Value * Exposure Factor= 125,000 * 0.25= $31,250Incorrect Answers:A, C, D: These are not SLEs of this project.

3. Right Answer: A,B,D
Explanation: The principles of access controls focus on availability, integrity, and confidentiality, as loss or danger is directly related to these three: Loss of confidentiality- Someone sees a password or a company's secret formula, this is referred to as loss of confidentiality. Loss of integrity- An e-mail message is modified in transit, a virus infects a file, or someone makes unauthorized changes to a Web site is referred to as loss of integrity. Loss of availability- An e-mail server is down and no one has e-mail access, or a file server is down so data files aren't available comes under loss of availability.

4. Right Answer: C
Explanation: Since the enterprise's internal and external environments are constantly changing, the risk environment is also highly dynamic, i.e., threats and vulnerabilities change over time. Hence KRIs need to be maintained to ensure that KRIs continue to effectively capture these changes.Incorrect Answers:A: Timely risk reporting is one of the business requirements, but is not the reason behind KRI maintenance.B: While most key risk indicator metrics need to be optimized in respect to their sensitivity, the most important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in threats and vulnerabilities over time.D: Avoiding risk is a type of risk response. Risk responses are based on KRI reporting.

5. Right Answer: A
Explanation: Program Management control comes under management class of controls, not technical.Program Management control is driven by the Federal Information Security Management Act (FISMA). It provides controls to ensure compliance with FISMA.These controls complement other controls. They don't replace them.Incorrect Answers:B, C, D: These controls comes under technical class of control.The Technical class of controls includes four families. These families include over 75 individual controls. Following is a list of each of the families in the Technical class: Access Control (AC): This family of controls helps an organization implement effective access control. They ensure that users have the rights and permissions they need to perform their jobs, and no more. It includes principles such as least privilege and separation of duties. Audit and Accountability (AU): This family of controls helps an organization implement an effective audit program. It provides details on how to determine what to audit. It provides details on how to protect the audit logs. It also includes information on using audit logs for non-repudiation.Identification and Authentication (IA): These controls cover different practices to identify and authenticate users. Each user should be uniquely identified. In other words, each user has one account. This account is only used by one user. Similarly, device identifiers uniquely identify devices on the network. System and Communications Protection (SC): The SC family is a large group of controls that cover many aspects of protecting systems and communication channels. Denial of service protection and boundary protection controls are included. Transmission integrity and confidentiality controls are also included.

0 Comments

Leave a comment