SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Risk avoidance
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
The process for systematically avoiding risk - constituting one approach to managing risk
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
2. Event
The remaining risk after management has implemented a risk response
business process modeling
statistical process control
Something that happens at a specific place and/or time
3. Access control
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
Standards standards published by: ISACA
4. Business process owner
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
5. Asset
British Standards Institution
Carnegie Mellon University
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
The discipline by which an enterprise in any industry assesses - controls - exploits - finances and monitors risk from all sources for the purpose of increasing the enterprise's short- and long-term value to its stakeholders
6. EL
Software Engineering Institute
statistical process control
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
expected loss
7. BSI
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
British Standards Institution
committee of sponsoring organizations
8. FMEA
Failure modes effects analysis
Carnegie Mellon University
international organization for standards
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
9. MAGERIT
international organization for standards
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
Methodology for Information Systems Risk Analysis and Management
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
10. Project portfolio
The management of risk through the use of countermeasures and controls
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
11. Risk transfer
operationally critical threat and vulnerability evaluation
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
12. cusum
Software Engineering Institute
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
cumulative summary. each value is added for a cummulative total.
13. IT infrastructure
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. SIE
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
Software Engineering Institute
15. CRISC
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
certified in risk and information systems control
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
16. Recovery time objective
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
A measure of the potential severity of loss or the potential gain from realized events/scenarios
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
17. Governance
A description of the overall (identified) IT risk to which the enterprise is exposed
Failure modes effects analysis
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
A probable situation with uncertain frequency and magnitude of loss (or gain)
18. Risk map
risk management information systems
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
Methodology for Information Systems Risk Analysis and Management
19. CMU
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
Business Process Reengineering
Carnegie Mellon University
business continuity planning
20. Availability
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
The process for systematically avoiding risk - constituting one approach to managing risk
21. Resilience
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
The management of risk through the use of countermeasures and controls
The net effect - positive or negative - on the achievement of business objectives
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
22. Integrity
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
Failure modes effects analysis
The net effect - positive or negative - on the achievement of business objectives
23. Risk portfolio view
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
risk management information systems
statistical process control
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
24. Reputation risk
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
25. Vulnerability event
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
international organization for standards
risk management information systems
26. Data custodian
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
cumulative summary. each value is added for a cummulative total.
The individual(s) and department(s) responsible for the storage and safeguarding of computerized data
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
27. Risk analysis
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
Business Process Reengineering
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
Control Objectives for Information and Related Technology
28. Business objective
A probable situation with uncertain frequency and magnitude of loss (or gain)
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
A further development of the business goals into tactical targets and desired results and outcomes
29. Business risk
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
A probable situation with uncertain frequency and magnitude of loss (or gain)
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
30. Preventive control
business continuity planning
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
31. Business case
Failure modes effects analysis
expected loss
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
enterprise risk management
32. Threat
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
33. Threat analysis
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
The net effect - positive or negative - on the achievement of business objectives
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
34. Event type
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
critical success factor
statistical process control
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
35. Capability
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
British Standards Institution
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
36. Risk indicator
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
critical success factor
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
37. IT risk register
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
committee of sponsoring organizations
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
38. Risk culture
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
39. IT risk profile
A description of the overall (identified) IT risk to which the enterprise is exposed
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
risk control self assessment
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
40. Impact analysis
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
41. Frequency
business continuity planning
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
A measure of the rate by which events occur over a certain period of time
critical success factor
42. Application controls
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
business process modeling
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
43. standards publisher of IT Audit and Assurance
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
Standards standards published by: ISACA
44. Key risk indicator (KRI)
certified in risk and information systems control
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
45. Objectivity
1. A process by which frequency and magnitude of IT risk scenarios are estimated. 2. The initial steps of risk management: analyzing the value of assets to the business - identifying threats to those assets and evaluating how vulnerable each asset is
business process modeling
The ability to exercise judgment - express opinions and present recommendations with impartiality
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
46. SPC
operationally critical threat and vulnerability evaluation
statistical process control
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
Methodology for Information Systems Risk Analysis and Management
47. Vulnerability
commission
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
48. Recovery point objective (RPO)
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
commission
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
49. ISO
risk management information systems
international organization for standards
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
50. Disaster recovery plan (DRP)
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
The management of risk through the use of countermeasures and controls
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster