Information Technology > QUESTIONS & ANSWERS > CRISC Exam Prep Study Guide (All)

CRISC Exam Prep Study Guide

Document Content and Description Below

CRISC Exam Prep Study Guide What is the difference between a standard and a policy? - ANS - Standard = A mandatory action, explicit rules, controls or configuration settings that are designed to sup... port and conform to a policy. A standard should make a policy more meaningful and effective by including accepted specifications for hardware, software or behavior. Standards should always point to the policy to which they relate. Policy = IT policies help organizations to properly articulate the organization's desired behavior, mitigate risk and contribute to achieving the organization's goals. What are the 4 risk elements? - ANS - Threats, Vulnerabilities, Likelihood, and Impact. Threats exploit vulnerabilities and the level of risk is based on likelihood and the impact to the system. Describe risk appetite vs. risk tollerance - ANS - Risk appetite is how much risk an organization is willing to endure; Risk Tolerance is how much variation from that amount is acceptable. Name the 6 steps of the NIST Risk Management Framework (RMF) - ANS - 1. Categorize Information Systems 2. Select Security Controls 3. Implement Security Controls 4. Assess Security Controls 5. Authorize Information Systems 6. Monitor Security Controls Which framework is developed by ISACA and integrates other frameworks? a) (Val) IT b) IT Assurance Framework (ITAF) c) COBIT 5 d) Risk IT - ANS - c. COBIT 5 What are the 3 domains of ISACA's Risk IT Framework? - ANS - Risk Governance (RG), Risk Evaluation (RE), Risk Response (RR) What are the tenets of risk management? - ANS - confidentiality, integrity, and availability Which legal act requires U.S. Federal Govt agencies to establish an information security program? - ANS - Federal Information Security Management Act (FISMA) What is the Gramm-Leach-Bliley Act (GLBA) - ANS - GLBA requires periodic risk analysis performed on processes that deal with nonpublic financial information and personal financial data. The Risk Governance (RG) domain of the Risk IT framework is comprised of what 3 processes? - ANS - RG1: Establish and maintain a common risk view RG2: Integrate with ERM RG3: Make risk-aware business decisions The Risk Evaluation (RE) domain of the Risk IT framework is comprised of what 3 processes? - ANS - RE1: Collect Data RE2: Analyze Risk RE3: Maintain risk profile The Risk Response (RR) domain of the Risk IT framework is comprised of what 3 processes? - ANS - RR1: Articulate risk RR2: Manage risk RR3: React to events What is a threat agent? - ANS - The entity causing or enacting a threat against a vulnerability. What is the simple risk formula? - ANS - threats x vulnerabilities = risk What are the key areas of concern for emerging technologies? - ANS - Interoperability and Compatibility What are the 5 components of a risk scenario? - ANS - [Show More]

Last updated: 1 year ago

Preview 1 out of 14 pages

Add to cart

Instant download

document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

Reviews( 0 )

$10.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
91
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 11, 2022

Number of pages

14

Written in

Seller


seller-icon
Nutmegs

Member since 3 years

578 Documents Sold


Additional information

This document has been written for:

Uploaded

Oct 11, 2022

Downloads

 0

Views

 91

Document Keyword Tags


$10.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·