Domain 2 Capstone Review: Risk Identification & Evaluation
If you misidentify the risk, you assess it incorrectly.
If you assess it incorrectly, you govern it poorly.
This review blends all Domain 2 concepts.
Every question tests structure:
- Threat vs vulnerability vs event vs loss
- Inherent vs residual
- Methodology consistency
- BIA alignment
- Escalation discipline
- Root cause vs symptom
Take your time.
20 scenario-based questions
Question 1
A. Outdated authentication
B. Identity theft claims
C. Unauthorized access to payroll data
D. Weak monitoring
Answer & reasoning
Correct: C
A = vulnerability
B = loss result
C = exposure event
D = contributing condition
Question 2
A. Operating deficiency
B. Design deficiency
C. Threat event
D. Residual risk
Answer & reasoning
Correct: A
Control exists but fails in operation.
Question 3
A. Likelihood only
B. Combined evaluation
C. Impact only
D. Industry frequency
Answer & reasoning
Correct: B
Risk evaluation requires both likelihood and impact.
Question 4
A. Close the risk
B. Ignore because controls exist
C. Recalculate inherent risk
D. Escalate for evaluation
Answer & reasoning
Correct: D
Residual exceeds tolerance → escalate.
Question 5
A. Lack of standardized methodology
B. Weak BIA
C. Poor threat modeling
D. Excessive appetite
Answer & reasoning
Correct: A
Standardization enables aggregation.
Question 6
A.
What is the PRIMARY issue?
A. Weak threat modeling
B. High inherent risk
C. Weak encryption
D. Incomplete dependency mapping in BIA
Answer & reasoning
Correct: D
BIA must account for third-party dependencies.
Question 7
A. Excessive tolerance
B. False precision
C. Weak ERM
D. Inaccurate inherent risk
Answer & reasoning
Correct: B
Unreliable inputs create misleading outputs.
Question 8
A. Weak firewall
B. External attacker
C. External attacker exploits weak firewall to access sensitive financial records, resulting in reporting delays
D. Reporting delays
Answer & reasoning
Correct: C
Complete scenario: threat + vulnerability + event + impact.
Question 9
A. Inherent risk
B. Residual risk
C. Risk appetite
D. Risk aggregation
Answer & reasoning
Correct: B
Residual risk depends on control effectiveness.
Question 10
A. Acceptable recovery objective
B. Misalignment
C. Excessive mitigation
D. High inherent risk
Answer & reasoning
Correct: A
RTO must be ≤ MTD.
Question 11
Repeated unpatched vulnerabilities persist due to unclear remediation ownership.
What is the MOST significant root cause?
A. Weak scanning
B. High appetite
C. Weak BIA
D. Lack of accountability
Answer & reasoning
Correct: D
Recurring issues usually indicate accountability gaps.
Question 12
A. Deploy endpoint tools
B. Escalate to regulators
C. Reassess threat landscape exposure
D. Delay migration
Answer & reasoning
Correct: C
Threat landscape change → reassessment.
Question 13
A. Excessive mitigation
B. Poor inherent scoring
C. Weak threat modeling
D. Weak residual tracking
Answer & reasoning
Correct: D
Risks should remain documented.
Question 14
An organization prioritizes risk mitigation based only on financial loss, ignoring regulatory exposure.
What analytical weakness exists?
A. Weak likelihood scoring
B. Excessive tolerance
C. Incomplete impact analysis
D. Poor methodology
Answer & reasoning
Correct: C
Impact must include regulatory and reputational dimensions.
Question 15
A. Likelihood estimate
B. Impact scoring
C. Inherent risk
D. Threat identification
Answer & reasoning
Correct: B
Impact scoring must align with BIA.
Question 16
Threat modeling excludes insider threats while focusing only on external attackers.
What weakness exists?
A. Narrow threat modeling scope
B. Poor inherent risk
C. Excessive tolerance
D. Weak asset classification
Answer & reasoning
Correct: A
Threat modeling must consider internal and external threats.
Question 17
A. Elimination of risk
B. Risk transfer
C. Governance decision aligned to tolerance
D. Inherent risk miscalculation
Answer & reasoning
Correct: C
Acceptance must be formal and aligned to tolerance.
Question 18
A. Weak inherent scoring
B. Inability to aggregate risk consistently
C. Excessive mitigation
D. Threat landscape error
Answer & reasoning
Correct: B
Inconsistent criteria prevent meaningful aggregation.
Question 19
A. Impact component
B. Threat source
C. Risk event
D. Control deficiency
Answer & reasoning
Correct: A
Impact must be defined to support assessment.
Question 20
A. Immediate mitigation of one risk
B. Individual inherent scores only
C. Control elimination
D. Aggregated exposure
Answer & reasoning
Correct: D
Aggregation may exceed appetite even if individual risks do not.
Domain 2 master pattern
If you struggled with any question, revisit:
- Threat vs vulnerability vs event vs loss
- Inherent vs residual distinction
- Control effectiveness validation
- BIA alignment
- Standardized methodology
- Aggregation discipline
- Escalation rules
Domain 2 is about structured clarity.
If you can pass this
You:
- Identify risk cleanly.
- Analyze risk consistently.
- Evaluate risk against governance standards.
- Escalate appropriately.
- Think structurally — not emotionally.
That's CRISC thinking.