Test your basic knowledge |

CRISC Information Systems Control

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Threat






2. Detective control






3. IT architecture

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. Asset






5. COSO






6. SIE






7. BCP






8. Risk tolerance






9. OCTAVE






10. Internal controls






11. Feasibility study






12. Frequency






13. Fallback procedures






14. CMU






15. Business impact






16. IT risk register






17. System development life cycle (SDLC)






18. BPM






19. Evidence






20. Risk factor






21. Risk portfolio view






22. Risk culture






23. BPR






24. Enterprise risk management (ERM)

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


25. Enterprise Resource Planning (ERP)






26. Recovery time objective






27. Preventive control






28. Business impact analysis/assessment (BIA)






29. treadway






30. Key performance indicator (KPI)






31. RCSA






32. Risk appetite






33. Loss event

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. Business case






35. CRISC






36. Computer emergency response team (CERT)






37. Impact analysis






38. Governance






39. Risk map






40. Inherent risk






41. Threat analysis






42. Vulnerability event






43. Capability Maturity Model (CMM)






44. IT risk issue






45. Risk indicator






46. Vulnerability






47. Application controls






48. SPC






49. Control risk self-assessment






50. Data owner