Had something like this in a mock and the answer was A. When risk drops below appetite, best move is to optimize controls for efficiency, not just cut budget or scenarios. That way you keep risk managed without over-spending or missing new threats. Realigning appetite (B) isn't usually needed unless the business itself shifts strategy. Agree?
Q: 11
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile
has decreased and is now below management's risk appetite?
Options
Discussion
Always feels like ISACA wants A on these even though in reality, people just look for ways to cut budget. Option A
Its A. If the risk's now below appetite, best practice is to review and tweak controls for efficiency rather than just slash budgets or change appetite. Makes operations smoother but still keeps you covered. Pretty sure that's what ISACA wants here.
A , C looks tempting but that's the trap. Optimizing controls is what ISACA wants in this case.
A makes sense here since if risk is already below appetite, the smart move is to optimize rather than just start slashing budgets or removing scenarios. Keeps things efficient but within good governance practices. Pretty sure that's what ISACA expects but open to other views.
Wouldn’t B make more sense if management decides their risk appetite is set too high based on new business strategy? Seems like a legit move sometimes depending on external pressures or changes.
Be respectful. No spam.
Q: 12
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
Options
Discussion
Option D You need those regular reviews and updates, otherwise the register gets stale fast.
Why does ISACA always word these to make you second guess? Every practice I see points to D as being the real key for effectiveness, but the other choices aren't exactly wrong either.
Probably D is best here, as regular reviews and updates keep the risk register accurate and useful over time. If you skip that, even if other entries are current, the register loses relevance fast. Seen similar logic in practice tests-open to other thoughts but pretty sure.
B or D? Had something like this in a mock. Picked B because tracking risk response plans seems central to keeping the register actionable, but not totally sure that's what they're after here.
D is the way to go here. Regular reviews and updates make sure the risk register stays current as new risks pop up or things change in IT. If you skip this, even well-documented risks can become outdated and useless fast. Pretty sure ISACA expects that ongoing update process, but happy to hear arguments for B if anyone disagrees!
D , since without regular updates the whole register loses value fast. Pretty basic risk management best practice.
Regular reviews (D) stand out to me, since that's what keeps the risk register relevant as things change. Without updates, it gets outdated fast. Pretty sure that's what ISACA wants here, but open to hearing other takes.
I'd say B, since tracking response plans feels key to managing the register. Pretty sure that's what keeps actions moving.
Be respectful. No spam.
Q: 13
Which of the following should be the PRIMARY consideration when implementing controls for
monitoring user activity logs?
Options
Discussion
Option C every time for risk-based controls, that's how ISACA wants you to think for PRIMARY. Agree?
Always best to focus on proportionality for controls, so C here.
Be respectful. No spam.
Q: 14
Recent penetration testing of an organization's software has identified many different types of
security risks. Which of the following is the MOST likely root cause for the identified risk?
Options
Discussion
Is the question asking about risks that come from the actual code and architecture itself, or does it include misconfigurations during deployment too? If they mean coding/design issues only, B makes sense. But if config drift after deployment is in scope, C could be relevant.
Be respectful. No spam.
Q: 15
Which of the following is the MOST important objective of regularly presenting the project risk
register to the project steering committee?
Options
Discussion
D. that's what regular risk register reviews are for. Steering committee needs to track how mitigation actions are progressing. Agree?
Lots of similar practice questions mention the need to determine if new risks have been found, so B.
Don’t think it’s B. D is the best fit since regular reviews with the steering committee are all about tracking risk mitigation actions, not just spotting new scenarios. B is tempting because it sounds proactive, but "regularly presenting" means we’re making sure existing mitigations are actually progressing. I think this lines up with real CRISC/ISACA practice but open to other takes.
Be respectful. No spam.
Q: 16
Which of the following will BEST help an organization evaluate the control environment of several
third-party vendors?
Options
Discussion
A imo. Internal risk assessments from the vendors themselves seem like they'd give a broad look at their key risks and controls, which can help evaluate the overall environment. I remember similar stuff from the official CRISC guide and some practice tests. Not 100 percent if that's what ISACA wants for "BEST" since independent control reports are strong too, but A feels practical to me. Open if someone disagrees.
Hard to say, B, since independent control reports from high-risk vendors are what auditors look for when evaluating controls.
A , since vendor risk assessments usually outline their whole controls landscape. B feels like a trap here.
B tbh, because independent control reports like SOC 2 or ISAE 3402 give you an unbiased look at how strong a vendor's controls really are. Internal docs or references aren't as reliable for assessing actual control environment. Open to hearing other views if you disagree.
B
Honestly not super clear on this but independent reports sound most objective for control checks. Can someone confirm if B is the typical best practice or am I missing something?
Be respectful. No spam.
Q: 17
An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure
for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Options
Discussion
A or D but leaning A here. Without proper due diligence on the cloud vendor, you can't be sure about their security or compliance posture, which could expose the org to way bigger risks than unclear architecture roles. Similar question showed up in some practice sets.
Had something like this in a mock and picked D, not sure if that's right though.
I see why D might jump out since unclear architecture roles can cause confusion and gaps, especially during a cloud move. D
Option D makes sense to me because if architecture responsibilities aren't defined, critical controls could get missed or overlap. I saw a similar scenario flagged on a practice set. I might be off though if due diligence is totally skipped.
Probably A. . If no due diligence is done, you have no visibility into service or risk at all.
Be respectful. No spam.
Q: 18
The question focuses on the primary reason for communicating risk assessment results to data
owners.
Analyzing the Options:
Options
Discussion
Option C is the right pick. Communicating risk assessment results helps data owners know where to focus and prioritize their response actions. Pretty sure that's what ISACA's looking for here.
C vs D for me. But I think C is more in line with what the ISACA review manual pushes-making sure owners can actually prioritize actions. If you want to double check, the official guide covers this well.
C, fits the context here.
C tbh, saw a nearly identical question in practice and it's all about letting data owners know where to focus efforts first.
Its C
C or D but C fits since communication happens after assets are classified so response prioritization makes more sense.
Be respectful. No spam.
Q: 19
Winch of the following can be concluded by analyzing the latest vulnerability report for the it
infrastructure?
Options
Discussion
Yeah, it's control weakness. D. The other options need extra info that the report doesn't provide.
D or maybe C? Saw something similar on my practice test and leaned toward D since the report points directly to control gaps, but sometimes wording throws me off.
D imo. Vulnerability reports really just highlight where your controls aren't working right? Not seeing how you'd get the others from just that report. Let me know if I'm missing something.
A isn't right, it's D. The report just tells us where the control gaps or weaknesses are, not about threat likelihood or impact by itself. That's how I've seen it explained in most practice stuff. Open to correction though if I'm missing something.
Be respectful. No spam.
Q: 20
During an IT risk scenario review session, business executives question why they have been assigned
ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be
owned by IT. Which of the following is the BEST way for the risk practitioner to address these
concerns?
Options
Discussion
Option A. pretty common guidance in ISACA official guides and practice exams. Makes sense to reframe IT risk into business language for execs. Anyone use the ISACA scenario analysis toolkit for this?
Why not B here? Wouldn't an exec council also address cross-functional risk ownership?
A
A , putting IT risk in business terms shows execs why it matters to their goals. Just talking technical won't close the gap. Pretty sure that's what they're looking for here, but open to other takes if someone thinks B is stronger.
This flips on whether "address concerns" means helping execs accept ownership now. A
A imo. Execs usually relate better when IT risk is tied directly to business impact.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2