ISACA Certified in Risk and Information Systems Control CRISC Exam Questions in PDF

Free ISACA CRISC Dumps Questions (page: 7)

Which of the following is true for Cost Performance Index (CPI)?

  1. If the CPI > 1, it indicates better than expected performance of project
  2. CPI = Earned Value (EV) * Actual Cost (AC)
  3. It is used to measure performance of schedule
  4. If the CPI = 1, it indicates poor performance of project

Answer(s): A

Explanation:

Cost performance index (CPI) is used to calculate performance efficiencies of project. It is used in trend analysis to predict future performance. CPI is the ratio of earned value to actual cost.
If the CPI value is greater than 1, it indicates better than expected performance, whereas if the value is less than 1, it shows poor performance.

Incorrect Answers:
B: CPI is the ratio of earned value to actual cost, i.e., CPI = Earned Value (EV) / Actual Cost (AC).

C: Cost performance index (CPI) is used to calculate performance efficiencies of project and not its schedule. D: The CPI value of 1 indicates that the project is right on target.



Which of the following do NOT indirect information?

  1. Information about the propriety of cutoff
  2. Reports that show orders that were rejected for credit limitations.
  3. Reports that provide information about any unusual deviations and individual product margins.
  4. The lack of any significant differences between perpetual levels and actual levels of goods.

Answer(s): A

Explanation:

Information about the propriety of cutoff is a kind of direct information. Incorrect Answers:
B: Reports that show orders that were rejected for credit limitations provide indirect information that credit checking aspects of the system are working as intended.

C: Reports that provide information about any unusual deviations and individual product margins (whereby, the price of an item sold is compared to its standard cost) provide indirect information that controls over billing and pricing are operating.

D: The lack of any significant differences between perpetual levels and actual levels provides indirect information that its billing controls are operating.



Ben works as a project manager for the MJH Project. In this project, Ben is preparing to identify stakeholders so he can communicate project requirements, status, and risks. Ben has elected to use a salience model as part of his stakeholder identification process. Which of the following activities best describes a salience model?

  1. Describing classes of stakeholders based on their power (ability to impose their will), urgency (need for immediate attention), and legitimacy (their involvement is appropriate).
  2. Grouping the stakeholders based on their level of authority ("power") and their level or concern ("interest") regarding the project outcomes.
  3. Influence/impact grid, grouping the stakeholders based on their active involvement ("influence") in the project and their ability to affect changes to the project's planning or execution ("impact").
  4. Grouping the stakeholders based on their level of authority ("power") and their active involvement ("influence") in the project.

Answer(s): A

Explanation:

A salience model defines and charts stakeholders' power, urgency, and legitimacy in the project.

The salience model is a technique for categorizing stakeholders according to their importance. The various difficulties faced by the project managers are as follows:
How to choose the right stakeholders?

How to prioritize competing claims of the stakeholders communication needs?

Stakeholder salience is determined by the evaluation of their power, legitimacy and urgency in the organization.
Power is defined as the ability of the stakeholder to impose their will. Urgency is the need for immediate action.
Legitimacy shows the stakeholders participation is appropriate or not.
The model allows the project manager to decide the relative salience of a particular stakeholder. Incorrect Answers:
B: This defines the power/interest grid. C: This defines an influence/impact grid. D: This defines a power/influence grid.



Which of the following is the first MOST step in the risk assessment process?

  1. Identification of assets
  2. Identification of threats
  3. Identification of threat sources
  4. Identification of vulnerabilities

Answer(s): A

Explanation:

Asset identification is the most crucial and first step in the risk assessment process. Risk identification, assessment and evaluation (analysis) should always be clearly aligned to assets. Assets can be people, processes, infrastructure, information or applications.



Which of the following matrices is used to specify risk thresholds?

  1. Risk indicator matrix
  2. Impact matrix
  3. Risk scenario matrix
  4. Probability matrix

Answer(s): A

Explanation:

Risk indicators are metrics used to indicate risk thresholds, i.e., it gives indication when a risk level is approaching a high or unacceptable level of risk. The main objective of a risk indicator is to ensure tracking and reporting mechanisms that alert staff about the potential risks.

Incorrect Answers:
B, D: Estimation of risk's consequence and priority for awareness is conducted by using probability and impact matrix. These matrices specify the mixture of probability and impact that directs to rating the risks as low, moderate, or high priority.

C: A risk scenario is a description of an event that can lay an impact on business, when and if it would occur.

Some examples of risk scenario are of: Having a major hardware failure
Failed disaster recovery planning (DRP) Major software failure



Share your comments for ISACA CRISC exam with other users:

S
Senthil
9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps

H
Harry
6/27/2023 7:20:00 AM

appriciate if you could upload this again

A
Anonymous
7/10/2023 4:10:00 AM

please upload the dump

R
Raja
6/20/2023 5:30:00 AM

i found some questions answers mismatch with explanation answers. please properly update

D
Doora
11/30/2023 4:20:00 AM

nothing to mention

D
deally
1/19/2024 3:41:00 PM

knowable questions

S
Sonia
7/23/2023 4:03:00 PM

very helpfull

B
binEY
10/6/2023 5:15:00 AM

good questions

N
Neha
9/28/2023 1:58:00 PM

its helpful

D
Desmond
1/5/2023 9:11:00 PM

i just took my oracle exam and let me tell you, this exam dumps was a lifesaver! without them, iam not sure i would have passed. the questions were tricky and the answers were obscure, but the exam dumps had everything i needed. i would recommend to anyone looking to pass their oracle exams with flying colors (and a little bit of cheating) lol.

D
Davidson OZ
9/9/2023 6:37:00 PM

22. if you need to make sure that one computer in your hot-spot network can access the internet without hot-spot authentication, which menu allows you to do this? answer is ip binding and not wall garden. wall garden allows specified websites to be accessed with users authentication to the hotspot

3
381
9/2/2023 4:31:00 PM

is question 1 correct?

L
Laurent
10/6/2023 5:09:00 PM

good content

S
Sniper69
5/9/2022 11:04:00 PM

manged to pass the exam with this exam dumps.

D
Deepak
12/27/2023 2:37:00 AM

good questions

D
dba
9/23/2023 3:10:00 AM

can we please have the latest exam questions?

P
Prasad
9/29/2023 7:27:00 AM

please help with jn0-649 latest dumps

G
GTI9982
7/31/2023 10:15:00 PM

please i need this dump. thanks

E
Elton Riva
12/12/2023 8:20:00 PM

i have to take the aws certified developer - associate dva-c02 in the next few weeks and i wanted to know if the questions on your website are the same as the official exam.

B
Berihun Desalegn Wonde
7/13/2023 11:00:00 AM

all questions are more important

G
gr
7/2/2023 7:03:00 AM

ques 4 answer should be c ie automatically recover from failure

R
RS
7/27/2023 7:17:00 AM

very very useful page

B
Blessious Phiri
8/12/2023 11:47:00 AM

the exams are giving me an eye opener

A
AD
10/22/2023 9:08:00 AM

3rd so far, need to cover more

M
Matt
11/18/2023 2:32:00 AM

aligns with the pecd notes

S
Sri
10/15/2023 4:38:00 PM

question 4: b securityadmin is the correct answer. https://docs.snowflake.com/en/user-guide/security-access-control-overview#access-control-framework

H
H.T.M. D
6/25/2023 2:55:00 PM

kindly please share dumps

S
Satish
11/6/2023 4:27:00 AM

it is very useful, thank you

C
Chinna
7/30/2023 8:37:00 AM

need safe rte dumps

1
1234
6/30/2023 3:40:00 AM

can you upload the cis - cpg dumps

D
Did
1/12/2024 3:01:00 AM

q6 = 1. download odt application 2. create a configuration file (xml) 3. setup.exe /download to download the installation files 4. setup.exe /configure to deploy the application

J
John
10/12/2023 12:30:00 PM

great material

D
Dinesh
8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.

L
LBert
6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??

AI Tutor 👋 I’m here to help!