Engineering Exam Study Guide with
complete and Verified solutions (Latest
2025/2026 Update)
Question:
List Cybersecurity Framework 5 core functions?
i,- i,- i,- i,- i,-
Answer:
1. identity
i,- i,-
2. Protect
i,-
3. Detect
i,-
4. Respond
i,-
5. Recover
i,-
Question:
Residual Risk? i,-
Answer:
the risk that remains after management implements internal controls or
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
some other response to risk
i,- i,- i,- i,-
,Question:
Risk Appetite?
i,-
Answer:
The amount of risk a company is willing to accept to achieve its goals and
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
objectives. To avoid undue risk, risk appetite must be in alignment with
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
company strategy. i,-
Question:
ISO 31000 Framework?
i,- i,-
Answer:
- used to integrate the risk management process into their management
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
and operational systems
i,- i,-
- can be adapted to an organization's specific operations and objectives
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
begins with an evaluation of an organization's risk contexts, including all
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
major factors both inside and outside the organization that affect its
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
objective's and operation's i,- i,-
Question:
COBIT Framework? i,-
Answer:
- current framework version is COBIT5
i,- i,- i,- i,- i,-
,- based on the following principles:
i,- i,- i,- i,- i,-
- meeting stakeholder needs
i,- i,- i,-
- covering the enterprise end-to-end
i,- i,- i,- i,-
- applying a single, integrated framework
i,- i,- i,- i,- i,-
- enabling a holistic approach
i,- i,- i,- i,-
- separating governance from management
i,- i,- i,- i,-
Question:
COSO?
Answer:
Committee of Sponsoring Organizations of the Treadway Commission an
i,- i,- i,- i,- i,- i,- i,- i,- i,-
initiative of 5 private sector organizations collaborating on the
i,- i,- i,- i,- i,- i,- i,- i,- i,-
development of risk management frameworks. i,- i,- i,- i,-
Question:
Risk Management Life cycle phases?
i,- i,- i,- i,-
Answer:
identify i,-
Assess
Control
Review
, Question:
NIST Cybersecurity Framework core?
i,- i,- i,-
Answer:
Identify i,-
Protect
Detect
Respond
Recover
Question:
KPI (Key Performance Indicator)?
i,- i,- i,-
Answer:
A formal mechanism designed to measure performance of a program
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
against desired goals.
i,- i,-
Question:
Key risk indicators (KRIs)?
i,- i,- i,-
Answer: