Domain 2 Capstone Review: Risk Identification & Evaluation
If you misidentify the risk, you assess it incorrectly.
If you assess it incorrectly, you govern it poorly.
This review blends all Domain 2 concepts.
Every question tests structure:
- Threat vs vulnerability vs event vs loss
- Inherent vs residual
- Methodology consistency
- BIA alignment
- Escalation discipline
- Root cause vs symptom
Take your time.
20 scenario-based questions
Question 1
An outdated authentication system allows unauthorized access to payroll data, resulting in employee identity theft claims.
What is the risk event?
A. Outdated authentication
B. Identity theft claims
C. Unauthorized access to payroll data
D. Weak monitoring
Answer & reasoning
Correct: C
A = vulnerability
B = loss result
C = exposure event
D = contributing condition
Question 2
A control exists but is not performed consistently, resulting in repeated compliance violations.
This represents:
A. Design deficiency
B. Operating deficiency
C. Threat event
D. Residual risk
Answer & reasoning
Correct: B
Control exists but fails in operation.
Question 3
A rare but catastrophic event is identified. Likelihood is low, impact is extreme.
What is MOST important for prioritization?
A. Likelihood only
B. Impact only
C. Combined evaluation
D. Industry frequency
Answer & reasoning
Correct: C
Risk evaluation requires both likelihood and impact.
Question 4
A risk rated as high inherent risk is reduced to moderate residual risk after mitigation. Tolerance threshold is “low.”
What should occur?
A. Close the risk
B. Escalate for evaluation
C. Ignore because controls exist
D. Recalculate inherent risk
Answer & reasoning
Correct: B
Residual exceeds tolerance → escalate.
Question 5
Departments use different scoring scales for risk analysis, preventing enterprise comparison.
What governance weakness exists?
A. Weak BIA
B. Lack of standardized methodology
C. Poor threat modeling
D. Excessive appetite
Answer & reasoning
Correct: B
Standardization enables aggregation.
Question 6
A vendor outage causes payroll delays. The organization did not evaluate vendor dependency in its BIA.
What is the PRIMARY issue?
A. Weak threat modeling
B. Incomplete dependency mapping in BIA
C. High inherent risk
D. Weak encryption
Answer & reasoning
Correct: B
BIA must account for third-party dependencies.
Question 7
A quantitative risk model produces exact financial loss values based on limited historical data.
What is the PRIMARY concern?
A. Excessive tolerance
B. False precision
C. Weak ERM
D. Inaccurate inherent risk
Answer & reasoning
Correct: B
Unreliable inputs create misleading outputs.
Question 8
Which is the BEST risk scenario?
A. Weak firewall
B. External attacker
C. External attacker exploits weak firewall to access sensitive financial records, resulting in reporting delays
D. Reporting delays
Answer & reasoning
Correct: C
Complete scenario: threat + vulnerability + event + impact.
Question 9
Residual risk is assumed low without validating control effectiveness.
What is MOST likely inaccurate?
A. Inherent risk
B. Residual risk
C. Risk appetite
D. Risk aggregation
Answer & reasoning
Correct: B
Residual risk depends on control effectiveness.
Question 10
A system has an MTD of 12 hours and an RTO of 10 hours.
What does this indicate?
A. Misalignment
B. Acceptable recovery objective
C. Excessive mitigation
D. High inherent risk
Answer & reasoning
Correct: B
RTO must be ≤ MTD.
Question 11
Repeated unpatched vulnerabilities persist due to unclear remediation ownership.
What is the MOST significant root cause?
A. Weak scanning
B. Lack of accountability
C. High appetite
D. Weak BIA
Answer & reasoning
Correct: B
Recurring issues usually indicate accountability gaps.
Question 12
A rise in ransomware attacks in the industry occurs prior to cloud migration.
What should occur FIRST?
A. Deploy endpoint tools
B. Reassess threat landscape exposure
C. Escalate to regulators
D. Delay migration
Answer & reasoning
Correct: B
Threat landscape change → reassessment.
Question 13
A risk register removes risks once they fall within tolerance.
What governance weakness exists?
A. Excessive mitigation
B. Weak residual tracking
C. Poor inherent scoring
D. Weak threat modeling
Answer & reasoning
Correct: B
Risks should remain documented.
Question 14
An organization prioritizes risk mitigation based only on financial loss, ignoring regulatory exposure.
What analytical weakness exists?
A. Incomplete impact analysis
B. Weak likelihood scoring
C. Excessive tolerance
D. Poor methodology
Answer & reasoning
Correct: A
Impact must include regulatory and reputational dimensions.
Question 15
A system disruption risk is rated low impact despite BIA identifying the process as critical.
What is MOST likely wrong?
A. Likelihood estimate
B. Impact scoring
C. Inherent risk
D. Threat identification
Answer & reasoning
Correct: B
Impact scoring must align with BIA.
Question 16
Threat modeling excludes insider threats while focusing only on external attackers.
What weakness exists?
A. Poor inherent risk
B. Narrow threat modeling scope
C. Excessive tolerance
D. Weak asset classification
Answer & reasoning
Correct: B
Threat modeling must consider internal and external threats.
Question 17
A risk rated as moderate residual risk is accepted formally and documented.
This represents:
A. Elimination of risk
B. Risk transfer
C. Governance decision aligned to tolerance
D. Inherent risk miscalculation
Answer & reasoning
Correct: C
Acceptance must be formal and aligned to tolerance.
Question 18
An organization uses different criteria for defining “High” impact across subsidiaries.
What governance risk does this create?
A. Weak inherent scoring
B. Inability to aggregate risk consistently
C. Excessive mitigation
D. Threat landscape error
Answer & reasoning
Correct: B
Inconsistent criteria prevent meaningful aggregation.
Question 19
A vulnerability is identified but no corresponding business impact is documented.
What is missing?
A. Threat source
B. Risk event
C. Impact component
D. Control deficiency
Answer & reasoning
Correct: C
Impact must be defined to support assessment.
Question 20
Multiple moderate risks individually fall within tolerance but collectively approach appetite limits.
What should be evaluated?
A. Immediate mitigation of one risk
B. Aggregated exposure
C. Individual inherent scores only
D. Control elimination
Answer & reasoning
Correct: B
Aggregation may exceed appetite even if individual risks do not.
Domain 2 master pattern
If you struggled with any question, revisit:
- Threat vs vulnerability vs event vs loss
- Inherent vs residual distinction
- Control effectiveness validation
- BIA alignment
- Standardized methodology
- Aggregation discipline
- Escalation rules
Domain 2 is about structured clarity.
If you can pass this
You:
- Identify risk cleanly.
- Analyze risk consistently.
- Evaluate risk against governance standards.
- Escalate appropriately.
- Think structurally — not emotionally.
That's CRISC thinking.