SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. RMF
risk management framework
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
A measure of the rate by which events occur over a certain period of time
2. RMIS
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
statistical process control
risk management information systems
The management of risk through the use of countermeasures and controls
3. Risk transfer
The remaining risk after management has implemented a risk response
operationally critical threat and vulnerability evaluation
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
4. Resilience
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
The net effect - positive or negative - on the achievement of business objectives
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
5. IT risk scenario
The ability to exercise judgment - express opinions and present recommendations with impartiality
business process modeling
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
6. Magnitude
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
A measure of the potential severity of loss or the potential gain from realized events/scenarios
A description of the overall (identified) IT risk to which the enterprise is exposed
7. Computer emergency response team (CERT)
risk management framework
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
8. Enterprise Resource Planning (ERP)
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
business process modeling
enterprise risk management
Software Engineering Institute
9. Preventive control
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
An internal control that is used to avoid undesirable events - errors and other occurrences that an enterprise has determined could have a negative material effect on a process or end product
commission
10. Application controls
The process for systematically avoiding risk - constituting one approach to managing risk
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
Something that happens at a specific place and/or time
11. Business impact analysis/assessment (BIA)
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
enterprise risk management
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
12. RCSA
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
business continuity planning
risk control self assessment
commission
13. COSO
committee of sponsoring organizations
statistical process control
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
14. Risk map
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
The remaining risk after management has implemented a risk response
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
15. SIE
international electrotechnical commission
Software Engineering Institute
critical success factor
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
16. CRISC
Software Engineering Institute
statistical process control
certified in risk and information systems control
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
17. Asset
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
Software Engineering Institute
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
18. IT risk issue
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
Carnegie Mellon University
cumulative summary. each value is added for a cummulative total.
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
19. Risk aggregation
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
The net effect - positive or negative - on the achievement of business objectives
20. BSI
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
British Standards Institution
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
21. Capability Maturity Model (CMM)
risk control self assessment
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
certified in risk and information systems control
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
22. treadway
A measure of the potential severity of loss or the potential gain from realized events/scenarios
commission
The management of risk through the use of countermeasures and controls
committee of sponsoring organizations
23. Risk tolerance
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
24. Risk indicator
Control Objectives for Information and Related Technology
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
25. Vulnerability event
commission
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
26. Enterprise risk management (ERM)
27. Access control
The net effect - positive or negative - on the achievement of business objectives
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
international electrotechnical commission
28. Inherent risk
An evaluation of the type - scope and nature of events or actions that can result in adverse consequences; identification of the threats that exist against enterprise assets Scope Note: The threat analysis usually defines the level of threat and the
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
A measure of the rate by which events occur over a certain period of time
29. EL
expected loss
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
critical success factor
A probable situation with uncertain frequency and magnitude of loss (or gain)
30. System development life cycle (SDLC)
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
A description of the overall (identified) IT risk to which the enterprise is exposed
The process of assigning risk to another enterprise - usually through the purchase of an insurance policy or by outsourcing the service
31. Control risk self-assessment
The net effect - positive or negative - on the achievement of business objectives
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
32. Vulnerability
Carnegie Mellon University
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
risk control self assessment
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
33. IT risk
The ability to exercise judgment - express opinions and present recommendations with impartiality
business process modeling
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
34. Recovery time objective
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
expected loss
A probable situation with uncertain frequency and magnitude of loss (or gain)
The amount of time allowed for the recovery of a business function or resource after a disaster occurs
35. Business continuity plan (BCP)
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
36. Project portfolio
A probable situation with uncertain frequency and magnitude of loss (or gain)
risk management information systems
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
37. Access rights
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
38. Risk factor
critical success factor
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
expected loss
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
39. BPM
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
business process modeling
A description of the overall (identified) IT risk to which the enterprise is exposed
40. Frequency
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
A measure of the rate by which events occur over a certain period of time
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
41. Disaster recovery plan (DRP)
committee of sponsoring organizations
The net effect - positive or negative - on the achievement of business objectives
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
42. Event type
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
Carnegie Mellon University
commission
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
43. Risk avoidance
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
The process for systematically avoiding risk - constituting one approach to managing risk
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
44. Impact analysis
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
Something that happens at a specific place and/or time
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
45. Internal controls
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
The process for systematically avoiding risk - constituting one approach to managing risk
The translation of the enterprise's mission from a statement of intention into performance targets and results
46. COBIT
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
Determined based on the acceptable data loss in case of a disruption of operations. It indicates the earliest point in time that is acceptable to recover the data. The RPO effectively quantifies the permissible amount of data loss in case of interrup
Control Objectives for Information and Related Technology
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
47. IT risk register
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
A repository of the key attributes of potential and known IT risk issues. Attributes may include name - description - owner - expected/actual frequency - potential/actual magnitude - potential/actual business impact - disposition.
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
48. Event
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
The process for systematically avoiding risk - constituting one approach to managing risk
risk management information systems
Something that happens at a specific place and/or time
49. Loss event
50. Information systems (IS)
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
A probable situation with uncertain frequency and magnitude of loss (or gain)
The combination of strategic - managerial and operational activities involved in gathering - processing - storing - distributing and using information and its related technologies Scope Note: Information systems are distinct from information technolo
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C