WITH COMPLETE SOLUTION.
Preventive Control Answer - A mitigating technique designated to prevent an
event from occurring.
Incident Response Plan Answer - A plan that defines the action steps, involved
resources and communication strategy upon identification of a threat or
potential threat event, such as a breach in security protocol, power or
telecomunnications outage, severe weather or workplace violence.
Control Self-Assessment Answer - A technique used to internally assess the
effectiveness of risk management and control processes.
Business Continuity Strategy Answer - Comprehensive strategies to recover,
resume and maintain all critical business functions.
Technical Controls Answer - Controls to prevent and detect unauthorized
activity.
Procedures Answer - Defines the manner in which an organization will
proceed, perform or affect something to accomplish the objectives of a policy.
Title 31 of the Code of Federal Regulation (CFR) Part 370 Answer - Governs the
handling of payments for the Bureau of Public Debt made through the ACH
Network.
,Unfair, Deceptive or Abusive Acts or Practices (UDAAP) Answer - Law to
protect consumers purchasing financial products and services requiring that
consumers have access to information that lets them choose the option they
believe is best for their situation.
Risk Evaluation Answer - Process of comparing risk analysis results to
determine if risk is at an acceptable level.
Business Impact Analysis (BIA) Answer - Process of identifying the potential
impact of uncontrolled, non-specific events on an institution's business
processes.
Enterprise Risk Management Answer - Process of planning, organizing, leading
and controlling the activities of an organization to minimize the effects of risk
on that organization.
Risk Measurement Answer - Process to determine the likelihood of an adverse
event or threat occurring and the potential impact of such an event on the
institution.
User Access Controls Answer - Security technique used to regulate who or
what can view or use resources in a computing environment.
Vulnerability Assessment Answer - Systematic examination of systems to
identify, quantify and prioritize the security deficiencies of the systems.
Function Drill/Parallel Test Answer - Testing method involves actual
mobilization of personnel to other sites attempting to establish
communications and perform actual recovery processing as outlined in the
business continuity plan (BCP).
, Risk Management Answer - Total process required to identify, control and
minimize the impact of uncertain events.
Layered Security Answer - Use of different controls at different points in a
transaction process.
Tabletop Exercise/Structured Walk-Through Test Answer - Testing method
ensures critical personnel from all areas are familiar with the business
continuity plan (BCP) and may be used as an effective training tool.
Walk-Through Drill/Simulation Test Answer - Testing method used to apply a
specific event scenario to the business continuity plan (BCP).
Payroll Card Account Answer - A bank account established directly or indirectly
by an employer on behalf of an employee to which an employee's wages are
electronically transferred to.
Credit Card Answer - A card indicating the holder has been granted a line of
credit to make purchases or withdraw cash up to a prearranged ceiling.
Prepaid/Stored Value Card Answer - A card-based payment system that assigns
a value to the card; some cards can be "reloaded" through various methods
and others are designed to be discarded.
ECI - Electronically Created Item Answer - A check that never appears in paper
form.
Originator Answer - A company or individual that has been authorized by the
Receiver to initiate either a credit or debit ACH entry to their account.