SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Recovery time objective
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
2. IT risk register
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
3. Event type
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
expected loss
4. Business impact
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
The net effect - positive or negative - on the achievement of business objectives
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
5. Impact analysis
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
expected loss
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
The net effect - positive or negative - on the achievement of business objectives
6. Frequency
A measure of the rate by which events occur over a certain period of time
The remaining risk after management has implemented a risk response
The ability to exercise judgment - express opinions and present recommendations with impartiality
international organization for standards
7. Confidentiality
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
The net effect - positive or negative - on the achievement of business objectives
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
A measure of the rate by which events occur over a certain period of time
8. Risk tolerance
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
A probable situation with uncertain frequency and magnitude of loss (or gain)
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
9. Access rights
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
A description of the overall (identified) IT risk to which the enterprise is exposed
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
10. COBIT
The process for systematically avoiding risk - constituting one approach to managing risk
Control Objectives for Information and Related Technology
The remaining risk after management has implemented a risk response
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
11. Risk factor
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
A description of the overall (identified) IT risk to which the enterprise is exposed
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
12. Resilience
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
13. RCSA
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
risk control self assessment
cumulative summary. each value is added for a cummulative total.
14. Application controls
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
risk management information systems
The net effect - positive or negative - on the achievement of business objectives
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
15. IT risk issue
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
16. BCP
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
The translation of the enterprise's mission from a statement of intention into performance targets and results
business continuity planning
17. Capability
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
operationally critical threat and vulnerability evaluation
18. ERM
enterprise risk management
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
19. BPM
business process modeling
commission
Business Process Reengineering
Methodology for Information Systems Risk Analysis and Management
20. Data custodian
operationally critical threat and vulnerability evaluation
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
21. BSI
British Standards Institution
A probable situation with uncertain frequency and magnitude of loss (or gain)
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
22. BPR
enterprise risk management
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
Business Process Reengineering
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
23. Key performance indicator (KPI)
The remaining risk after management has implemented a risk response
risk management information systems
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
24. Risk appetite
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
The management of risk through the use of countermeasures and controls
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
25. IT risk scenario
British Standards Institution
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
26. Data owner
operationally critical threat and vulnerability evaluation
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
The remaining risk after management has implemented a risk response
27. IT risk profile
Business Process Reengineering
A description of the overall (identified) IT risk to which the enterprise is exposed
risk management framework
Standards standards published by: ISACA
28. Control risk self-assessment
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
statistical process control
risk control self assessment
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
29. Integrity
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
business process modeling
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
30. Risk culture
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
31. RMF
risk management framework
Business Process Reengineering
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
32. Fallback procedures
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
33. Internal controls
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
Control Objectives for Information and Related Technology
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
34. OCTAVE
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
operationally critical threat and vulnerability evaluation
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
35. MAGERIT
Methodology for Information Systems Risk Analysis and Management
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
36. Computer emergency response team (CERT)
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
37. standards publisher of IT Audit and Assurance
The ability to exercise judgment - express opinions and present recommendations with impartiality
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
certified in risk and information systems control
Standards standards published by: ISACA
38. CRISC
A description of the overall (identified) IT risk to which the enterprise is exposed
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
certified in risk and information systems control
39. Recovery point objective (RPO)
committee of sponsoring organizations
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
A measure of the potential severity of loss or the potential gain from realized events/scenarios
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
40. Risk map
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
Carnegie Mellon University
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
41. Inherent risk
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
certified in risk and information systems control
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
42. Risk mitigation
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
The management of risk through the use of countermeasures and controls
business continuity planning
committee of sponsoring organizations
43. Access control
British Standards Institution
international electrotechnical commission
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
44. Governance
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
operationally critical threat and vulnerability evaluation
45. Asset
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
Business Process Reengineering
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
46. Threat analysis
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
The management of risk through the use of countermeasures and controls
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
47. Vulnerability event
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
risk control self assessment
48. IT risk
A probable situation with uncertain frequency and magnitude of loss (or gain)
The net effect - positive or negative - on the achievement of business objectives
commission
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
49. Event
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
Something that happens at a specific place and/or time
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
50. Risk analysis
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
expected loss
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is