SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CRISC Information Systems Control
Start Test
Study First
Subjects
:
certifications
,
crisc
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. CSF
critical success factor
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
The net effect - positive or negative - on the achievement of business objectives
2. Availability
The ability to exercise judgment - express opinions and present recommendations with impartiality
committee of sponsoring organizations
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
statistical process control
3. Business goal
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. Risk culture
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
cumulative summary. each value is added for a cummulative total.
A study to prioritize the criticality of information resources for the enterprise based on costs (or consequences) of adverse events In an impact analysis - threats to assets are identified and potential business losses determined for different time
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
5. System development life cycle (SDLC)
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
A description of the overall (identified) IT risk to which the enterprise is exposed
The phases deployed in the development or acquisition of a software system. Scope Note: SDLC is an approach used to plan - design - develop - test and implement an application system or a major modification to an application system. Typical phases of
6. Fallback procedures
operationally critical threat and vulnerability evaluation
committee of sponsoring organizations
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
7. RCSA
risk control self assessment
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
risk management information systems
The current and prospective effect on earnings and capital arising from negative public opinion. Scope Note: Reputation risk affects a bank's ability to establish new relationships or services - or to continue servicing existing relationships. It may
8. BPM
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
business process modeling
expected loss
9. Evidence
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
10. CRISC
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
business continuity planning
certified in risk and information systems control
Business Process Reengineering
11. Loss event
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
12. Event type
For the purpose of IT risk management - one of three possible sorts of events: threat event - loss event and vulnerability event. Scope Note: Being able to consistently and effectively differentiate the different types of events that contribute to ri
The ability to exercise judgment - express opinions and present recommendations with impartiality
The set of hardware - software and facilities that integrates an enterprise's IT assets. Scope Note: Specifically - the equipment (including servers - routers - switches and cabling) - software - services and products used in storing - processing - t
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
13. Application controls
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
The ability to exercise judgment - express opinions and present recommendations with impartiality
The translation of the enterprise's mission from a statement of intention into performance targets and results
The policies - procedures and activities designed to provide reasonable assurance that objectives relevant to a given automated solution (application) are achieved
14. Computer emergency response team (CERT)
The ability to exercise judgment - express opinions and present recommendations with impartiality
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
risk management framework
15. Business objective
The translation of the enterprise's mission from a statement of intention into performance targets and results
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
A further development of the business goals into tactical targets and desired results and outcomes
16. Business impact analysis/assessment (BIA)
The translation of the enterprise's mission from a statement of intention into performance targets and results
critical success factor
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
certified in risk and information systems control
17. Authentication
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
18. Risk aggregation
certified in risk and information systems control
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
Any event during which a threat event results in loss. Scope Note: From Jones - J.; 'FAIR Taxonomy -' Risk Management Insight - USA - 2008
The net effect - positive or negative - on the achievement of business objectives
19. Detective control
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
business process modeling
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
20. Business impact
The net effect - positive or negative - on the achievement of business objectives
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
Anything (e.g. - object - substance - human) that is capable of acting against an asset in a manner that can result in harm. Scope Note: A potential cause of an unwanted incident (ISO/IEC 13335)
Exists to detect and report when errors - omissions and unauthorized uses or entries occur
21. cusum
expected loss
A measure of the rate by which events occur over a certain period of time
cumulative summary. each value is added for a cummulative total.
Control Objectives for Information and Related Technology
22. Key performance indicator (KPI)
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
statistical process control
23. CMU
Carnegie Mellon University
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
The process for systematically avoiding risk - constituting one approach to managing risk
Description of the fundamental underlying design of the IT components of the business - the relationships among them - and the manner in which they support the enterprise's objectives
24. Business risk
enterprise risk management
operationally critical threat and vulnerability evaluation
international organization for standards
A probable situation with uncertain frequency and magnitude of loss (or gain)
25. Internal controls
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
The individual(s) - normally a manager or director - who has responsibility for the integrity - accurate reporting and use of computerized data
The policies - procedures - practices and organizational structures designed to provide reasonable assurance that business
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
26. Business continuity plan (BCP)
risk management framework
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
British Standards Institution
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
27. SPC
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
critical success factor
1. Information that proves or disproves a stated issue 2. Information that an auditor gathers in the course of performing an IS audit; relevant if it pertains to the audit objectives and has a logical relationship to the findings and conclusions it i
statistical process control
28. Capability
A condition that can influence the frequency and/or magnitude and - ultimately - the business impact of IT-related events/scenarios
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
A metric capable of showing that the enterprise is subject to - or has a high probability of being subject to - a risk that exceeds the defined risk appetite Risk management 1. The coordinated activities to direct and control an enterprise with regar
An aptitude - competency or resource that an enterprise may possess or require at an enterprise - business function or individual level that has the potential - or is required - to contribute to a business outcome and to create value
29. Access control
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
Evaluating the criticality and sensitivity of information assets. An exercise that determines the impact of losing the support of any resource to an enterprise - establishes the escalation of that loss over time - identifies the minimum resources nee
The process of integrating risk assessments at a corporate level to obtain a complete view on the overall risk for the enterprise
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
30. Governance
Ensures that stakeholder needs - conditions and options are evaluated to determine balanced - agreed-on enterprise objectives to be achieved; setting direction through prioritization and decision making; and monitoring performance and compliance agai
A measure of the potential severity of loss or the potential gain from realized events/scenarios
business process modeling
The acceptable level of variation that management is willing to allow for any particular risk as the enterprise pursues its objectives
31. IT infrastructure
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
32. Asset
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
1. The risk level or exposure without taking into account the actions that management has taken or might take (e.g. -implementing controls) 2. The risk that a material error could occur - assuming that there are no related internal controls to preven
Something of either tangible or intangible value that is worth protecting - including people - information - infrastructure - finances and reputation
Control Objectives for Information and Related Technology
33. FMEA
Failure modes effects analysis
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
The amount of risk - on a broad level - that an entity is willing to accept in pursuit of its mission
34. IT risk
The description of an IT-related event that can lead to a business impact IT-related incident An IT-related event that causes an operational - developmental and/or strategic business impact
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
Methodology for Information Systems Risk Analysis and Management
35. Enterprise risk management (ERM)
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. RMF
The processes - rules and deployment mechanisms that control access to information systems - resources and physical access to premises
The permission or privileges granted to users - programs or workstations to create - change - delete or view data and files within a system - as defined by rules established by data owners and the information security policy
business process modeling
risk management framework
37. Business process owner
The individual responsible for identifying process requirements - approving process design and managing process performance. Scope Note: Must be at an appropriately high level in the enterprise and have authority to commit resources to process-specif
The business risk associated with the use - ownership - operation - involvement - influence and adoption of IT within an enterprise
A measure of the potential severity of loss or the potential gain from realized events/scenarios
British Standards Institution
38. Resilience
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
statistical process control
Business Process Reengineering
39. Threat event
international organization for standards
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
1. Contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc - immature processes to disciplined - mature processes with improved quality and effectiveness. 2. C
Any event during which a threat element/actor acts against an asset in a manner that has the potential to directly result in harm
40. Key risk indicator (KRI)
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
1. An instance of IT risk 2. A combination of control - value and threat conditions that impose a noteworthy level of IT risk
A subset of risk indicators that are highly relevant and possess a high probability of predicting or indicating important risk. Scope Note: See also Risk Indicator.
A plan of action or set of procedures to be performed if a system implementation - upgrade or modification does not work as intended Scope Note: May involve restoring the system to its state prior to the implementation or change. Fallback procedures
41. BSI
Any event during which a material increase in vulnerability results. Note that this increase in vulnerability can result from changes in control conditions or from changes in threat capability/force.
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
British Standards Institution
Preserving authorized restrictions on access and disclosure - including means for protecting privacy and proprietary information
42. Disaster recovery plan (DRP)
A phase of a system development life cycle (SDLC) methodology that researches the feasibility and adequacy of resources for the development or acquisition of a system solution to a user need
Ensuring timely and reliable access to and use of information. Balanced scorecard (BSC) Developed by Robert S. Kaplan and David P. Norton as a coherent set of performance measures organized into four categories that includes traditional financial mea
A set of human - physical - technical and procedural resources to recover - within a defined time and cost - an activity interrupted by an emergency or disaster
A enterprise to automate and integrate the majority of its planning. System packaged business software system that allows an business processes - share common data and practices across the entire enterprise - and produce and access information in a r
43. Vulnerability
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
A plan used by an enterprise to respond to disruption of critical business processes. Depends on the contingency plan for restoration of critical systems
A group of people integrated at the enterprise with clear lines of reporting and responsibilities for standby support in case of an information systems emergency. This group will act as an efficient corrective control - and should also act as a singl
A measure that determines how well the process is performing in enabling the goal to be reached. Scope Note: A lead indicator of whether a goal will likely be reached - and a good indicator of capabilities - practices and skills. It measures an activ
44. COSO
The set of projects owned by a company. Scope Note: It usually includes the main guidelines relative to each project - including objectives - costs - time lines and other information specific to the project.
Carnegie Mellon University
Guarding against improper information modification or destruction - and includes ensuring information non-repudiation and authenticity
committee of sponsoring organizations
45. IT architecture
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. Magnitude
A measure of the potential severity of loss or the potential gain from realized events/scenarios
A method/process by which management and staff of all levels collectively identify and evaluate risk and controls with their business areas. This may be under the guidance of a facilitator such as an auditor or risk manager.
1. The act of verifying identity (i.e. - user - system) Scope Note: Risk: Can also refer to the verification of the correctness of a piece of data 2. The act of verifying the identity of a user and the user's eligibility to access computerized inform
The set of shared values and beliefs that governs attitudes toward risk-taking - care and integrity - and determines how openly risk and losses are reported and discussed
47. EL
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
A (graphic) tool for ranking and displaying risk by defined ranges for frequency and magnitude
expected loss
Methodology for Information Systems Risk Analysis and Management
48. Reputation risk
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
49. Business case
The ability of a system or network to resist failure or to recover quickly from any disruption - usually with minimal recognizable effect
Documentation of the rationale for making a business investment - used both to support a business decision on whether to proceed with the investment and as an operational tool to support management of the investment through its full economic life cyc
1. A method to identify interdependencies and interconnections among risk - as well as the effect of risk responses on multiple types of risk 2. A method to estimate the aggregate impact of multiple types of risk (e.g. - cascading and coincidental th
risk management framework
50. BCP
A measure of the rate by which events occur over a certain period of time
business continuity planning
A weakness in the design - implementation - operation or internal control of a process that could expose the system to adverse threats from threat events
certified in risk and information systems control