Payments Risk Policy & Governance Flashcards

10%

1
Q

What is risk management?

A

The process required to identify, control, and minimize the impact of risk events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is risk appetite?

A

The amount of risk, on a broad level, an organization is willing to accept in pursuit of value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is risk tolerance?

A

The acceptable level of variation between the achievement of a specific objective and the risk appetite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is risk culture?

A

The norms and traditions of behavior of individuals and of groups within an organization that determine the way in which they identify, understand, discuss, and act on the risk the organization confronts and takes on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is risk assessment?

A

The overall process of risk identification, analysis, and evaluation that guides resource allocation, and assists in designing the infrastructure necessary to effectively respond to and monitor risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is risk identification?

A

Finding, recognizing, and describing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is risk analysis?

A

The process to determine the level of risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is risk evaluation?

A

The process of comparing risk assessment results to determine if residual risk is at an acceptable level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is risk acceptance?

A

An informed decision to accept or take a particular risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is risk avoidance?

A

An informed decision to withdraw from, or not become involved with, an activity in order to avoid exposure to unwanted or unacceptable risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is risk sharing?

A

A form of risk treatment involving the agreed-upon distribution of risk among other parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is risk assignment?

A

The allocation of risk by agreement
(it is a form of risk sharing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is the board of directors?

A

A group of individuals that are elected to act as representatives of stockholders and to establish corporate management-related policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who is the chief executive officer (CEO)?

A

The highest-ranking executive in an organization whose primary responsibilities include making major corporate decisions, managing overall operations and resources, and acting as the main point of communication between the board and the organization’s operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Who is the senior management team?

A

A group of individuals at the highest level of management who have the day-to-day task of managing the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who are shareholders?

A

A group that either plays a direct role through electing directors or an indirect role by not investing in a company, thereby pressuring management to meet sales and profit projections

17
Q

What should an audit policy address?

A

An organization’s policy objective, the scope of work, the assignment and administration of authority, auditing standards, and if audit functions are handled in-house or outsourced

18
Q

What are procedures?

A

Instructions that define how an organization will proceed, perform, or affect something to accomplish the objectives of a policy

19
Q

What are PCI Data security standard requirements?

A
  1. Install and maintain a firewall configuration to protect cardholder data
  2. Do not use vendor-supplied defaults for system passwords and other security parameters
  3. Protect stored data
  4. Encrypt transmission of cardholder data across open, public networks
  5. Use and regularly update anti-virus software
  6. Develop and maintain secure systems and applications
  7. Restrict access to cardholder data by business need-to-know
  8. Assign a unique ID to each person with computer access
  9. Restrict physical access to cardholder data
  10. Track and monitor all access to network resources and cardholder data
  11. Regularly test security systems and processes
  12. Maintain a policy that addresses information security
20
Q

What are the three components of the PCI Compliance continuous process?

A

Assess
Remediate
Report

21
Q

What is the Payment Card Industry Data Security Standard (PCI DSS)?

A

A global data security standard that all businesses must adhere to in order to accept payment cards, and to store, process, and / or transmit cardholder standards

22
Q

What is the purpose of a customer identification program (CIP)?

A

It is intended to enable a financial institution to form a reasonable belief that it knows the true identity of each customer

23
Q

What must a customer identification program (CIP) include?

A

Account opening procedures that specify identifying information that should be obtained from each customer, reasonable procedures for verifying their identity, and information should be documented and retained

24
Q

What is the beneficial ownership rule?

A

A rule from the Financial Crimes Enforcement Network (FinCEN), stating an institution must establish and maintain written procedures that are reasonably designed to identify and verify beneficial owner(s) of 25% or greater of a legal entity customer, and to include such procedures in its anti-money laundering compliance program