SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Integrity
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
A description of the overall (identified) IT risk to which the enterprise is exposed
The translation of the enterprise's mission from a statement of intention into performance targets and results
2. Business continuity plan (BCP)
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
risk management framework
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
3. Control risk self-assessment
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
The process for systematically avoiding risk - constituting one approach to managing risk
4. Evidence
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
5. SPC
Failure modes effects analysis
business continuity planning
Methodology for Information Systems Risk Analysis and Management
statistical process control
6. Data owner
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
7. Business goal
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
8. Risk mitigation
The management of risk through the use of countermeasures and controls
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
business continuity planning
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
9. CMU
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
Carnegie Mellon University
Methodology for Information Systems Risk Analysis and Management
10. Risk transfer
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
The management of risk through the use of countermeasures and controls
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
11. Risk culture
commission
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
business process modeling
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
12. BCP
business continuity planning
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
Standards standards published by: ISACA
13. IT risk profile
A description of the overall (identified) IT risk to which the enterprise is exposed
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
Business Process Reengineering
risk management framework
14. Risk aggregation
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
15. Disaster recovery plan (DRP)
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
enterprise risk management
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
16. standards publisher of IT Audit and Assurance
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
Standards standards published by: ISACA
certified in risk and information systems control
critical success factor
17. Enterprise risk management (ERM)
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. IT risk register
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
international electrotechnical commission
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
19. Recovery time objective
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
20. Risk map
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
21. Inherent risk
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
22. IEC
A further development of the business goals into tactical targets and desired results and outcomes
international electrotechnical commission
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
cumulative summary. each value is added for a cummulative total.
23. Residual risk
The remaining risk after management has implemented a risk response
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
24. Impact analysis
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
international organization for standards
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
The remaining risk after management has implemented a risk response
25. BPM
business process modeling
statistical process control
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
26. RCSA
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
risk control self assessment
A measure of the potential severity of loss or the potential gain from realized events/scenarios
27. Project portfolio
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
Methodology for Information Systems Risk Analysis and Management
international electrotechnical commission
28. Authentication
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Event type
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
A probable situation with uncertain frequency and magnitude of loss (or gain)
British Standards Institution
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
30. Internal controls
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
The management of risk through the use of countermeasures and controls
31. Magnitude
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A measure of the potential severity of loss or the potential gain from realized events/scenarios
business process modeling
32. Business impact
Carnegie Mellon University
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
The net effect - positive or negative - on the achievement of business objectives
commission
33. EL
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
expected loss
committee of sponsoring organizations
34. Business impact analysis/assessment (BIA)
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
35. Application controls
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
36. Access rights
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
expected loss
Carnegie Mellon University
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
37. RMIS
operationally critical threat and vulnerability evaluation
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
risk management information systems
38. Fallback procedures
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
A further development of the business goals into tactical targets and desired results and outcomes
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
39. Enterprise Resource Planning (ERP)
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
40. Information systems (IS)
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
international electrotechnical commission
41. COBIT
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
Control Objectives for Information and Related Technology
The management of risk through the use of countermeasures and controls
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
42. Risk factor
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
expected loss
Business Process Reengineering
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
43. Recovery point objective (RPO)
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
44. Threat analysis
business continuity planning
expected loss
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
45. treadway
certified in risk and information systems control
A description of the overall (identified) IT risk to which the enterprise is exposed
Methodology for Information Systems Risk Analysis and Management
commission
46. ISO
international organization for standards
cumulative summary. each value is added for a cummulative total.
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
47. IT risk scenario
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
48. RMF
cumulative summary. each value is added for a cummulative total.
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
risk management framework
A further development of the business goals into tactical targets and desired results and outcomes
49. Capability
expected loss
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
commission
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
50. Access control
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
A probable situation with uncertain frequency and magnitude of loss (or gain)
A description of the overall (identified) IT risk to which the enterprise is exposed
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests