DON'T WANT TO MISS A THING?

Certification Exam Passing Tips

Latest exam news and discount info

Curated and up-to-date by our experts

Yes, send me the newsletter

Unlock Success with CRISC Pracatice Questions, Certified in Risk and Information Systems Control | SPOTO

Unlock success in your CRISC certification journey with SPOTO's practice questions. Access a variety of resources, including practice tests and mock exams, to assess your readiness for the exam. Our exam materials, such as exam dumps and sample questions, reinforce key concepts in risk management and information systems control. Utilize our exam simulator for realistic exam practice, simulating the exam environment and improving your time management skills. With SPOTO, you'll have all the tools you need to excel in your CRISC exam preparation. Start your preparation today and become a certified risk management expert capable of optimizing risk management across your organization.
Take other online exams

Question #1
Shelly is the project manager of the BUF project for her company. In this project Shelly needs to establish some rules to reduce the influence of risk bias during the qualitative risk analysis process. What method can Shelly take to best reduce the influence of risk bias?
A. Establish risk boundaries
B. Group stakeholders according to positive and negative stakeholders and then complete the risk analysis
C. Determine the risk root cause rather than the person identifying the risk events
D. Establish definitions of the level of probability and impact of risk event
View answer
Correct Answer: C
Question #2
Which of the following is the FOREMOST root cause of project risk? Each correct answer represents a complete solution. Choose two.
A. New system is not meeting the user business needs
B. Delay in arrival of resources
C. Lack of discipline in managing the software development process
D. Selection of unsuitable project methodology
View answer
Correct Answer: A
Question #3
Which of the following comes under phases of risk management?
A. Assessing risk
B. Prioritization of risk
C. Identify risk
D. Monitoring risk
E. Developing risk
View answer
Correct Answer: B
Question #4
Which of the following control detects problem before it can occur?
A. Deterrent control
B. Detective control
C. Compensation control
D. Preventative control
View answer
Correct Answer: D
Question #5
Which of the following control is used to ensure that users have the rights and permissions they need to perform their jobs, and no more?
A. System and Communications protection control
B. Audit and Accountability control
C. Access control
D. Identification and Authentication control
View answer
Correct Answer: B
Question #6
Which of the following is the MOST important aspect to ensure that an accurate risk register is maintained?
A. Publish the risk register in a knowledge management platform with workflow features that periodically contacts and polls risk assessors to ensure accuracy of content
B. Perform regular audits by audit personnel and maintain risk register
C. Submit the risk register to business process owners for review and updating
D. Monitor key risk indicators, and record the findings in the risk register
View answer
Correct Answer: C
Question #7
There are four inputs to the Monitoring and Controlling Project Risks process. Which one of the following will NOT help you, the project manager, to prepare for risk monitoring and controlling?
A. Risk register
B. Work Performance Information
C. Project management plan
D. Change requests
View answer
Correct Answer: C
Question #8
Which of the following steps ensure effective communication of the risk analysis results to relevant stakeholders? Each correct answer represents a complete solution. Choose three.
A. The results should be reported in terms and formats that are useful to support business decisions
B. Provide decision makers with an understanding of worst-case and most probable scenarios,due diligence exposures and significant reputation, legal or regulatory considerations
C. Communicate the negative impacts of the events only, it needs more consideration
D. Communicate the risk-return context clearly
View answer
Correct Answer: D
Question #9
Marie has identified a risk event in her project that needs a mitigation response. Her response actually creates a new risk event that must now be analyzed and planned for. What term is given to this newly created risk event?
A. Residual risk
B. Secondary risk
C. Infinitive risk
D. Populated risk
View answer
Correct Answer: C
Question #10
Which among the following is the BEST reason for defining a risk response?
A. To eliminate risk from the enterprise
B. To ensure that the residual risk is within the limits of the risk appetite and tolerance
C. To overview current status of risk
D. To mitigate risk
View answer
Correct Answer: D
Question #11
Judy has identified a risk event in her project that will have a high probability and a high impact. Based on the requirements of the project, Judy has asked to change the project scope to remove the associated requirement and the associated risk. What type of risk response is this?
A. Exploit
B. Not a risk response, but a change request
C. Avoidance
D. Transference
View answer
Correct Answer: D
Question #12
You are the project manager for TTP project. You are in the Identify Risks process. You have to create the risk register. Which of the following are included in the risk register? Each correct answer represents a complete solution. Choose two.
A. List of potential responses
B. List of key stakeholders
C. List of mitigation techniques
D. List of identified risks
View answer
Correct Answer: C
Question #13
You are the risk professional of your enterprise. You have performed cost and benefit analysis of control that you have adopted. What are all the benefits of performing cost and benefit analysis of control? Each correct answer represents a complete solution. Choose three.
A. It helps in determination of the cost of protecting what is important
B. It helps in taking risk response decisions
C. It helps in providing a monetary impact view of risk
D. It helps making smart choices based on potential risk mitigation costs and losses
View answer
Correct Answer: D
Question #14
You are the project manager of the GHT project. This project will last for 18 months and has a project budget of $567,000. Robert, one of your stakeholders, has introduced a scope change request that will likely have an impact on the project costs and schedule. Robert assures you that he will pay for the extra time and costs associated with the risk event. You have identified that change request may also affect other areas of the project other than just time and cost. What project management component is re
A. Configuration management
B. Integrated change control
C. Risk analysis
D. Project change control system
View answer
Correct Answer: ABC
Question #15
You are working in an enterprise. You project deals with important files that are stored on the computer. You have identified the risk of the failure of operations. To address this risk of failure, you have guided the system administrator sign off on the daily backup. This scenario is an example of which of the following?
A. Risk avoidance
B. Risk transference
C. Risk acceptance
D. Risk mitigation
View answer
Correct Answer: AD
Question #16
Risks with low ratings of probability and impact are included for future monitoring in which of the following?
A. Risk alarm
B. Observation list
C. Watch-list
D. Risk register
View answer
Correct Answer: D
Question #17
Billy is the project manager of the HAR Project and is in month six of the project. The project is scheduled to last for 18 months. Management asks Billy how often the project team is participating in risk reassessment in this project. What should Billy tell management if he's following the best practices for risk management?
A. Project risk management has been concluded with the project planning
B. Project risk management happens at every milestone
C. Project risk management is scheduled for every month in the 18-month project
D. At every status meeting the project team project risk management is an agenda item
View answer
Correct Answer: ACD
Question #18
You are using Information system. You have chosen a poor password and also sometimes transmits data over unprotected communication lines. What is this poor quality of password and unsafe transmission refers to?
A. Probabilities
B. Threats
C. Vulnerabilities
D. Impacts
View answer
Correct Answer: B
Question #19
You are elected as the project manager of GHT project. You have to initiate the project. Your Project request document has been approved, and now you have to start working on the project. What is the FIRST step you should take to initialize the project?
A. Conduct a feasibility study
B. Acquire software
C. Define requirements of project
D. Plan project management
View answer
Correct Answer: C
Question #20
Which of the following are external risk factors? Each correct answer represents a complete solution. Choose three.
A. Geopolitical situation
B. Complexity of the enterprise
C. Market
D. Competition
View answer
Correct Answer: D

View Answers after Submission

Please submit your email and WhatsApp to get the answers of questions.

Note: Please make sure your email ID and Whatsapp are valid so that you can get the correct exam results.

Email:
Whatsapp/phone number: