GRC Flashcards

1
Q

How many privacy principles make up the OECD privacy principles

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

GDPR only applies to people living in Australia (true or false)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This was developed for accountants

A

GAPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

All of the following are privacy challenges in the modern world except :
Geolocation considerations
Complex contracts
Fragmentation of laws
Granting end users too much privacy

A

Granting end users too much privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following help drive security
OECD Pivacy principles
E.U. general privacy principles
NIST privacy framework
Generally accepted privacy principles

A

Generally accepted privacy principles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Profitability is impacted by risk oversight and asset management but not by the enterprise architecture (true or false)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In the EA model enterprise governance is found at layer 4 (true or false)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which layer of the enterprise architecture reference model deals with the business units

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The first step in the TOGAF model is migration planning (true or false)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Security is not built into the SABSA model so its important for organizations to also implement zero trust (true or false)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does BIA stand for?

A

Business impact Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of bcm

A

Focuses on the organization’s strategy for business resilience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the steps of NIST SP 800-34

A

Determine mission processes and recovery criticality
Identify resource requirements
Identify recovery priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is RPO?

A

recovery point objective, represents the point and time prior to a disruption or system outage. To which business process data must be recovered after an outage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an rto?

A

It defines the maximum amount of time that a system resource can remain unavailable before there is an unexceptionable impact on other systems resources, mission/business processes and mtd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s an mtd?

A

Represents the total amount of time leaders/managers are willing to accept for a mission/business process outage or disruption and includes all impact considerations

17
Q

How many influential business drivers are there?

A

6

18
Q

What does CMMI STAND FOR

A

capability maturity model integration

19
Q

What are the significant compliance drivers used to manage a grc program effectively

A

Organizational, contractual, regulatory

20
Q

True or false
A code of ethics covers extreme care

A

True

21
Q

NIST SP 800-34 specifies the nine steps that are typically involved in accomplishing the business impact analysis (BIA)
TRUE OR fALSE

A

False

22
Q

How many privacy principles make up the OECD privacy principles

A

8

23
Q

True or false
In the EA model, enterprise governance is found at layer 4

A

False

24
Q

PCI-DSS has how many objectives

A

6

25
Q

True or false
Profitability is impacted by risk oversight and asset management, but not by the enterprise architecture

A

False

26
Q

True or false
GDRP only applies to people living in Australia

A

False

27
Q

BIA stands for?

A

Business impact analysis

28
Q

The ceo always reports directly to the grc lead because grc is deemed a critical component of the business
True or false

A

False

29
Q

True or false
Security is not built into the SABSA model so its important for organizations to also implement zero trust

A

False

30
Q

True or false
Business continuity management is solely focused on the technical recovery of systems and processes after an event occurs

A

False