Test your basic knowledge |

CRISC Information Systems Control

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Confidentiality






2. IT risk scenario






3. OCTAVE






4. Objectivity






5. Disaster recovery plan (DRP)






6. Integrity






7. Business impact analysis/assessment (BIA)






8. Risk factor






9. standards publisher of IT Audit and Assurance






10. Reputation risk

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


11. IT architecture

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


12. Enterprise risk management (ERM)

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


13. Event






14. Loss event

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


15. CMU






16. Risk avoidance






17. IT risk register






18. Risk map






19. Risk tolerance






20. Capability






21. Recovery point objective (RPO)






22. RCSA






23. ERM






24. Risk analysis






25. Business impact






26. Key risk indicator (KRI)






27. BSI






28. Resilience






29. RMIS






30. CSF






31. Feasibility study






32. cusum






33. Preventive control






34. Impact analysis






35. Information systems (IS)






36. Business process owner






37. BPM






38. Data owner






39. IEC






40. Risk mitigation






41. FMEA






42. Key performance indicator (KPI)






43. Vulnerability event






44. Application controls






45. Business risk






46. BCP






47. Risk portfolio view






48. System development life cycle (SDLC)






49. Access rights






50. Availability