SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Threat event
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
expected loss
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
2. BPR
Failure modes effects analysis
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
Business Process Reengineering
3. Business process owner
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
risk management framework
4. BPM
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
business process modeling
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
5. standards publisher of IT Audit and Assurance
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
business process modeling
Standards standards published by: ISACA
risk control self assessment
6. Preventive control
international electrotechnical commission
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
enterprise risk management
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
7. Business risk
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
A probable situation with uncertain frequency and magnitude of loss (or gain)
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
Business Process Reengineering
8. Feasibility study
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
9. SIE
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
international electrotechnical commission
A probable situation with uncertain frequency and magnitude of loss (or gain)
Software Engineering Institute
10. Computer emergency response team (CERT)
international organization for standards
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
A measure of the rate by which events occur over a certain period of time
11. RCSA
risk control self assessment
critical success factor
A probable situation with uncertain frequency and magnitude of loss (or gain)
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
12. BSI
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
British Standards Institution
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
13. Governance
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
14. Capability
international electrotechnical commission
The translation of the enterprise's mission from a statement of intention into performance targets and results
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
The remaining risk after management has implemented a risk response
15. Business continuity plan (BCP)
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
16. Risk mitigation
A description of the overall (identified) IT risk to which the enterprise is exposed
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
The management of risk through the use of countermeasures and controls
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
17. Business impact analysis/assessment (BIA)
The process for systematically avoiding risk - constituting one approach to managing risk
Control Objectives for Information and Related Technology
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
18. OCTAVE
operationally critical threat and vulnerability evaluation
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
business continuity planning
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
19. Risk avoidance
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
The process for systematically avoiding risk - constituting one approach to managing risk
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
20. Recovery point objective (RPO)
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
The remaining risk after management has implemented a risk response
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
21. IT risk register
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
Failure modes effects analysis
statistical process control
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
22. Availability
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
A further development of the business goals into tactical targets and desired results and outcomes
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
23. IT infrastructure
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
24. FMEA
A probable situation with uncertain frequency and magnitude of loss (or gain)
Failure modes effects analysis
expected loss
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
25. ISO
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
Business Process Reengineering
international organization for standards
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
26. RMIS
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
risk management information systems
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
27. IT architecture
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
28. Frequency
business continuity planning
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
A measure of the rate by which events occur over a certain period of time
29. Data owner
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
30. IT risk
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
Business Process Reengineering
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
31. COBIT
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
The process for systematically avoiding risk - constituting one approach to managing risk
Control Objectives for Information and Related Technology
32. Reputation risk
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. Risk appetite
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
34. IT risk scenario
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
The net effect - positive or negative - on the achievement of business objectives
35. Event
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
Something that happens at a specific place and/or time
36. Risk factor
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
37. Vulnerability
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
Control Objectives for Information and Related Technology
38. Enterprise Resource Planning (ERP)
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
39. Integrity
Failure modes effects analysis
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
40. Risk portfolio view
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
expected loss
The net effect - positive or negative - on the achievement of business objectives
41. Inherent risk
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
Software Engineering Institute
expected loss
42. Authentication
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Business goal
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. Evidence
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
Standards standards published by: ISACA
45. cusum
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
cumulative summary. each value is added for a cummulative total.
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
46. Risk map
statistical process control
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
commission
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
47. Risk analysis
The remaining risk after management has implemented a risk response
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
committee of sponsoring organizations
48. Data custodian
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
Something that happens at a specific place and/or time
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
49. Residual risk
Something that happens at a specific place and/or time
The remaining risk after management has implemented a risk response
A measure of the rate by which events occur over a certain period of time
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
50. CMU
Carnegie Mellon University
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
risk management information systems