Inspirational journeys

Follow the stories of academics and their research expeditions

CRISC—Certified in Risk and Information Systems Control Certification Questions and answer - Part 52

Mary Smith

Thu, 16 Apr 2026

CRISC—Certified in Risk and Information Systems Control Certification Questions and answer - Part 52

1. You are the project manager of RFT project. You have identified a risk that the enterprise's IT system and application landscape is so complex that, within a few years, extending capacity will become difficult and maintaining software will become very expensive. To overcome this risk the response adopted is re-architecture of the existing system and purchase of new integrated system. In which of the following risk prioritization options would this case be categorized?

A) Deferrals
B) Quick win
C) Business case to be made
D) Contagious risk



2. Which of the following BEST ensures that a firewall is configured in compliance with an enterprise's security policy?

A) Interview the firewall administrator.
B) Review the actual procedures.
C) Review the device's log file for recent attacks.
D) Review the parameter settings.



3. Which of following is NOT used for measurement of Critical Success Factors of the project?

A) Productivity
B) Quality
C) Quantity
D) Customer service



4. Which of the following statements is NOT true regarding the risk management plan?

A) The risk management plan is an output of the Plan Risk Management process.
B) The risk management plan is an input to all the remaining risk-planning processes.
C) The risk management plan includes a description of the risk responses and triggers.
D) The risk management plan includes thresholds, scoring and interpretation methods, responsible parties, and budgets.



5. You are the project manager of a project in Bluewell Inc. You and your project team have identified several project risks, completed risk analysis, and are planning to apply most appropriate risk responses. Which of the following tools would you use to choose the appropriate risk response?

A) Project network diagrams
B) Cause-and-effect analysis
C) Decision tree analysis
D) Delphi Technique



1. Right Answer: C
Explanation: This is categorized as a Business case to be made because the project cost is very large. The response to be implemented requires quite large investment.Therefore it comes under business case to be made.Incorrect Answers:A: It addresses costly risk response to a low risk. But here the response is less costly than that of business case to be made.B: Quick win is very effective and efficient response that addresses medium to high risk. But in this the response does not require large investments.D: This is not risk response prioritization option, instead it is a type of risk that happen with the several of the enterprise's business partners within a very short time frame.

2. Right Answer: D
Explanation: A review of the parameter settings will provide a good basis for comparison of the actual configuration to the security policy and will provide reliable audit evidence documentation.Incorrect Answers:A: While interviewing the firewall administrator may provide a good process overview, it does not reliably confirm that the firewall configuration complies with the enterprise's security policy.B: While procedures may provide a good understanding of how the firewall is supposed to be managed, they do not reliably confirm that the firewall configuration complies with the enterprise's security policy.C: While reviewing the device's log file for recent attacks may provide indirect evidence about the fact that logging is enabled, it does not reliably confirm that the firewall configuration complies with the enterprise's security policy.

3. Right Answer: C
Explanation: Incorrect Answers:A, B, D: Productivity, quality and customer service are used for evaluating critical service factor of any particular project.

4. Right Answer: C
Explanation: The risk management plan details how risk management processes will be implemented, monitored, and controlled throughout the life of the project. The risk management plandoes not include responses to risks or triggers. Responses to risks are documented in the risk register as part of the Plan Risk Responses process.Incorrect Answers:A, B, D: These all statements are true for risk management plan. The risk management plan details how risk management processes will be implemented, monitored, and controlled throughout the life of the project. It includes thresholds, scoring and interpretation methods, responsible parties, and budgets. It also act as input to all the remaining risk-planning processes.

5. Right Answer: C
Explanation: Decision tree analysis is a risk analysis tool that can help the project manager in determining the best risk response. The tool can be used to measure probability, impact, and risk exposure and how the selected risk response can affect the probability and/or impact of the selected risk event. It helps to form a balanced image of the risks and opportunities connected with each possible course of action. This makes them mostly useful for choosing between different strategies, projects, or investment opportunities particularly when the resources are limited. A decision tree is a decision support tool that uses a tree-like graph or model of decisions and their possible consequences, including chance event outcomes, resource costs, and utility.Incorrect Answers:A: Project network diagrams help the project manager and stakeholders visualize the flow of the project work, but they are not used as a part of risk response planning.B: Cause-and-effect analysis is used for exposing risk factors and not an effective one in risk response planning.This analysis involves the use of predictive or diagnostic analytical tool for exploring the root causes or factors that contribute to positive or negative effects or outcomes.D: Delphi technique is used for risk analysis, i.e., for identifying the most probable risks. Delphi is a group of experts who used to rate independently the business risk of an organization. Each expert analyzes the risk independently and then prioritizes the risk, and the result is combined into a consensus.

0 Comments

Leave a comment