SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Confidentiality
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
2. IT risk scenario
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
A measure of the potential severity of loss or the potential gain from realized events/scenarios
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
3. OCTAVE
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
operationally critical threat and vulnerability evaluation
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
business process modeling
4. Objectivity
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
The ability to exercise judgment - express opinions and present recommendations with impartiality
5. Disaster recovery plan (DRP)
risk control self assessment
The process for systematically avoiding risk - constituting one approach to managing risk
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
6. Integrity
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
A further development of the business goals into tactical targets and desired results and outcomes
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
7. Business impact analysis/assessment (BIA)
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
risk control self assessment
cumulative summary. each value is added for a cummulative total.
8. Risk factor
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
The ability to exercise judgment - express opinions and present recommendations with impartiality
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
9. standards publisher of IT Audit and Assurance
Standards standards published by: ISACA
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
10. Reputation risk
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. IT architecture
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Enterprise risk management (ERM)
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. Event
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
Something that happens at a specific place and/or time
14. Loss event
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
15. CMU
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
The process for systematically avoiding risk - constituting one approach to managing risk
A further development of the business goals into tactical targets and desired results and outcomes
Carnegie Mellon University
16. Risk avoidance
The process for systematically avoiding risk - constituting one approach to managing risk
enterprise risk management
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
international electrotechnical commission
17. IT risk register
Carnegie Mellon University
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
18. Risk map
A further development of the business goals into tactical targets and desired results and outcomes
A probable situation with uncertain frequency and magnitude of loss (or gain)
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
19. Risk tolerance
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
expected loss
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
20. Capability
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
Methodology for Information Systems Risk Analysis and Management
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
21. Recovery point objective (RPO)
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
Something that happens at a specific place and/or time
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
22. RCSA
risk control self assessment
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
The net effect - positive or negative - on the achievement of business objectives
Standards standards published by: ISACA
23. ERM
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
enterprise risk management
international electrotechnical commission
24. Risk analysis
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
25. Business impact
The net effect - positive or negative - on the achievement of business objectives
statistical process control
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
26. Key risk indicator (KRI)
The ability to exercise judgment - express opinions and present recommendations with impartiality
A measure of the rate by which events occur over a certain period of time
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
27. BSI
The ability to exercise judgment - express opinions and present recommendations with impartiality
A further development of the business goals into tactical targets and desired results and outcomes
Business Process Reengineering
British Standards Institution
28. Resilience
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
Business Process Reengineering
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
The translation of the enterprise's mission from a statement of intention into performance targets and results
29. RMIS
risk management information systems
Software Engineering Institute
critical success factor
operationally critical threat and vulnerability evaluation
30. CSF
A further development of the business goals into tactical targets and desired results and outcomes
risk management framework
critical success factor
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
31. Feasibility study
risk management information systems
The remaining risk after management has implemented a risk response
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
32. cusum
committee of sponsoring organizations
business continuity planning
cumulative summary. each value is added for a cummulative total.
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
33. Preventive control
certified in risk and information systems control
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
34. Impact analysis
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
35. Information systems (IS)
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
Carnegie Mellon University
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
36. Business process owner
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
A measure of the potential severity of loss or the potential gain from realized events/scenarios
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
37. BPM
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
business process modeling
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
38. Data owner
operationally critical threat and vulnerability evaluation
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
A measure of the potential severity of loss or the potential gain from realized events/scenarios
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
39. IEC
The net effect - positive or negative - on the achievement of business objectives
Control Objectives for Information and Related Technology
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
international electrotechnical commission
40. Risk mitigation
statistical process control
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
The management of risk through the use of countermeasures and controls
41. FMEA
The ability to exercise judgment - express opinions and present recommendations with impartiality
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
Failure modes effects analysis
42. Key performance indicator (KPI)
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
international organization for standards
43. Vulnerability event
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
commission
A measure of the rate by which events occur over a certain period of time
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
44. Application controls
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
The remaining risk after management has implemented a risk response
Software Engineering Institute
business process modeling
45. Business risk
A probable situation with uncertain frequency and magnitude of loss (or gain)
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
46. BCP
business continuity planning
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
47. Risk portfolio view
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
48. System development life cycle (SDLC)
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
A further development of the business goals into tactical targets and desired results and outcomes
Carnegie Mellon University
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
49. Access rights
commission
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
A further development of the business goals into tactical targets and desired results and outcomes
50. Availability
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
operationally critical threat and vulnerability evaluation
risk management framework