Inspirational journeys

Follow the stories of academics and their research expeditions

CRISC—Certified in Risk and Information Systems Control Certification Questions and answer - Part 57

Mary Smith

Thu, 16 Apr 2026

CRISC—Certified in Risk and Information Systems Control Certification Questions and answer - Part 57

1. Your project spans the entire organization. You would like to assess the risk of your project but worried about that some of the managers involved in the project could affect the outcome of any risk identification meeting. Your consideration is based on the fact that some employees would not want to publicly identify risk events that could declare their supervision as poor. You would like a method that would allow participants to anonymously identify risk events. What risk identification method could you use?

A) Delphi technique
B) Root cause analysis
C) Isolated pilot groups
D) SWOT analysis



2. Which of the following represents lack of adequate controls?

A) Vulnerability
B) Threat
C) Asset
D) Impact



3. The only output of qualitative risk analysis is risk register updates. When the project manager updates the risk register he will need to include several pieces of information including all of the following except for which one?

A) Trends in qualitative risk analysis
B) Risk probability-impact matrix
C) Risks grouped by categories
D) Watchlist of low-priority risks



4. Which of the following risks is the risk that happen with an important business partner and affects a large group of enterprises within an area or industry?

A) Contagious risk
B) Reporting risk
C) Operational risk
D) Systemic risk



5. You have been assigned as the Project Manager for a new project that involves development of a new interface for your existing time management system. You have completed identifying all possible risks along with the stakeholders and team and have calculated the probability and impact of these risks. Which of the following would you need next to help you prioritize the risks?

A) Affinity Diagram
B) Risk rating rules
C) Project Network Diagram
D) Risk categories



1. Right Answer: A
Explanation: The Delphi technique uses rounds of anonymous surveys to build consensus on project risks. Delphi is a technique to identify potential risk. In this technique, the responses are gathered via a question and their inputs are organized according to their contents. The collected responses are sent back to these experts for further input, addition, and comments. The final list of risks in the project is prepared after that. The participants in this technique are anonymous and therefore it helps prevent a person from unduly influencing the others in the group. The Delphi technique helps in reaching the consensus quickly.Incorrect Answers:B: Root cause analysis is not an anonymous approach to risk identification.C: Isolated pilot groups is not a valid risk identification activity.D: SWOT analysis evaluates the strengths, weaknesses, opportunities, and threats of the project.

2. Right Answer: A
Explanation: Vulnerability is a weakness or lack of safeguard that can be exploited by a threat, thus causing harm to the information systems or networks. It can exist in hardware, operating systems, firmware, applications, and configuration files. Hence lack of adequate controls represents vulnerability and would ultimately cause threat to the enterprise.Incorrect Answers:B: Threat is the potential cause of unwanted incident.C: Assets are economic resources that are tangible or intangible, and is capable of being owned or controlled to produce value.D: Impact is the measure of the financial loss that the threat event may have.

3. Right Answer: B
Explanation: The risk matrix is not included as part of the risk register updates. There are seven things that can be updated in the risk register as a result of qualitative risk analysis: relating ranking of project risks, risks grouped by categories, causes of risks, list of near-term risks, risks requiring additional analysis, watchlist of low- priority risks, trends in qualitative risk analysis.Incorrect Answers:A: Trends in qualitative risk analysis are part of the risk register updates.C: Risks grouped by categories are part of the risk register updates.D: Watchlist of low-priority risks is part of the risk register updates.

4. Right Answer: D
Explanation: Systemic risks are those risks that happen with an important business partner and affect a large group of enterprises within an area or industry. An example would be a nationwide air traffic control system that goes down for an extended period of time (six hours), which affects air traffic on a very large scale.Incorrect Answers:A: Contagious risks are those risk events that happen with several of the enterprise's business partners within a very short time frame.B, C: Their scopes do not limit to the important or general enterprise's business partners. These risks can occur with both.Operational risks are those risks that are associated with the day-to-day operations of the enterprise. It is the risk of loss resulting from inadequate or failed internal processes, people and systems, or from external events.Reporting risks are caused due to wrong reporting which leads to bad decision. This bad decision due to wrong report hence causes a risk on the functionality of the organization.

5. Right Answer: B
Explanation: Risk rating rules define how to prioritize risks after the related probability and impact values are calculated. These are generally included in the organizational process assets and are refined for individual projects.Incorrect Answers:A: Affinity Diagram is a method of group creativity technique to collect requirements which allows large numbers of ideas to be sorted into groups for review and analysis. This is generally used in Scope Management and not applicable to this option.C: A Project Network diagram shows the sequencing and linkage between various project tasks and is not applicable to this questionD: Risk categories are an output of the Perform Qualitative Risk Analysis process and not a tool to complete the process.

0 Comments

Leave a comment