Framework Identification Flashcards

(45 cards)

1
Q

A company is designing a system of internal controls to ensure the accuracy and reliability of financial reporting, including oversight by management and monitoring of control effectiveness. Which framework would be most appropriate?

A

COSO — Control Environment & Monitoring Activities

Why:
COSO is the primary framework for internal control over financial reporting (ICFR).

Control Environment → tone at the top

Monitoring → ensuring controls continue to operate effectively

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An organization wants to ensure its IT systems align with overall business objectives, while also managing IT risks and performance. Which framework should it use?

A

COBIT — Governance & Management Objectives

Why:
COBIT focuses on IT governance, making sure IT supports business goals and risks are managed appropriately.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company is building a cybersecurity program and needs a structured approach to identify threats, protect systems, detect attacks, and recover from incidents. Which framework is most appropriate?

A

National Institute of Standards and Technology — Cybersecurity Framework (Identify, Protect, Detect, Respond, Recover)

Why:
NIST CSF is designed specifically for managing cybersecurity risk across the full lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A company wants to demonstrate to external stakeholders that it follows internationally recognized information security practices and is willing to undergo formal certification. Which framework should it adopt?

A

International Organization for Standardization 27001 — Information Security Management System (ISMS)

Why:
ISO 27001 provides a formal, certifiable security standard, often used to prove security maturity to customers and regulators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company is evaluating whether its IT controls support reliable financial reporting, including access controls and change management. Which framework is most relevant?

A

COSO — Information & Communication + Control Activities

Why:
Even though IT is involved, the objective is financial reporting reliability, which points to COSO (not COBIT).
COBIT would be used if the focus were broader IT governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An organization wants a flexible framework to improve its cybersecurity posture internally, without needing formal certification. Which should it use?

A

National Institute of Standards and Technology — Cybersecurity Framework

Why:
NIST is guidance-based and flexible, unlike ISO which is formal and certifiable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A service organization wants to provide ongoing assurance to customers about internal controls over time, but not necessarily obtain a formal certification. What should it use?

A

SOC 2 Type 2 (not ISO)

Why:

ISO = certification

SOC 2 = assurance report over controls
This distinction shows up often in ISC sims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Management is emphasizing ethical behavior, integrity, and accountability across the organization. Which framework component does this relate to?

A

COSO — Control Environment

Why:
Control Environment = tone at the top, ethics, governance foundation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A company wants a prioritized, practical checklist of specific security actions (e.g., inventory devices, control admin privileges, continuous vulnerability management) to quickly improve its cybersecurity posture. Which framework is most appropriate?

A

Center for Internet Security Controls

Why:
CIS Controls are:

Action-oriented

Prioritized (18 controls)

Designed for implementation, not just guidance

Think:
👉 “What should we do first to be secure?”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A federal contractor must implement detailed, specific security controls to comply with government requirements, including access control policies, audit logging, and system integrity controls. Which framework should be used?

A

National Institute of Standards and Technology SP 800-53 — Security Control Catalog

Why:
NIST SP 800-53 provides:

Detailed control requirements

Used heavily by government and regulated entities

Much more granular than NIST CSF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An organization wants a high-level framework to organize its cybersecurity program, but does not need detailed control specifications. Which should it use?

A

National Institute of Standards and Technology Cybersecurity Framework (CSF)

Why:

NIST CSF = high-level structure (Identify–Protect–Detect–Respond–Recover)

NIST SP 800-53 = detailed control list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A small-to-midsize company wants a simple, prioritized set of cybersecurity actions rather than a comprehensive framework. Which is best?

A

Center for Internet Security Controls

Why:
CIS is:

Simpler than NIST

More practical and implementation-focused

Designed for quick adoption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company is concerned that its IT function is not aligned with business strategy, and leadership wants stronger governance over IT decisions. Which framework should be implemented?

A

COBIT — Governance Objectives

Why:

COBIT = IT governance and alignment

NIST = security, not governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An organization wants to obtain formal certification for its information security program rather than just implement detailed controls. Which should it choose?

A

International Organization for Standardization 27001 — ISMS

Why:

ISO = certification

NIST SP 800-53 = control catalog (no certification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An auditor notes that a company:

Maintains an inventory of authorized devices

Controls use of administrative privileges

Continuously monitors vulnerabilities

Which framework are these controls most closely associated with?

A

Center for Internet Security Controls

Why:
These are signature CIS controls—very practical, specific security actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Center for Internet Security Controls

Why:
These are signature CIS controls—very practical, specific security actions.

A

National Institute of Standards and Technology SP 800-53

Why:
Those two-letter control families are a hallmark of NIST SP 800-53.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company wants a framework to ensure internal controls over financial reporting are properly designed and monitored.

A

COSO

Why:
COSO is the primary framework for internal control over financial reporting (ICFR)—it covers design, implementation, and monitoring of controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An organization needs a structured approach to identify, detect, respond to, and recover from cyber threats.

A

National Institute of Standards and Technology Cybersecurity Framework

Why:
This is literally the NIST CSF lifecycle: Identify → Protect → Detect → Respond → Recover.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A company wants a prioritized list of specific security actions like controlling admin privileges and inventorying devices.v

A

A company wants a prioritized list of specific security actions like controlling admin privileges and inventorying devices.

20
Q

A federal contractor must implement detailed, categorized security controls such as AC (Access Control) and AU (Audit & Accountability).

A

National Institute of Standards and Technology SP 800-53

Why:
NIST SP 800-53 is a detailed control catalog, commonly required for government and regulated environments.

21
Q

Management wants to ensure IT strategy aligns with business objectives and risk management goals.

A

COBIT

Why:
COBIT focuses on IT governance, ensuring IT supports business strategy and manages risk.

22
Q

An organization wants a flexible cybersecurity framework but does NOT need detailed control requirements.

A

National Institute of Standards and Technology Cybersecurity Framework

Why:
NIST CSF is high-level and flexible, unlike SP 800-53 which is highly detailed.

23
Q

A company wants to demonstrate to customers that it meets internationally recognized security standards and obtain certification.

A

International Organization for Standardization 27001

Why:
ISO 27001 is a formal, certifiable information security standard used for external credibility.

24
Q

A company is implementing controls to ensure ethical behavior, strong governance, and tone at the top.

A

COSO — Control Environment

Why:
The Control Environment component of COSO focuses on ethics, integrity, and governance culture.

25
An organization wants very detailed, prescriptive security controls but does NOT care about certification.
National Institute of Standards and Technology SP 800-53 Why: SP 800-53 provides specific, prescriptive controls, while ISO is used for certification.
26
A small company wants a simple, practical way to quickly improve cybersecurity without complexity.
Center for Internet Security Controls Why: CIS Controls are designed to be simple, actionable, and easy to implement, especially for smaller organizations.
27
A company wants to ensure all employees are aware of ethical standards, management sets the tone for integrity, and internal audits are monitored regularly.
COSO — Control Environment Why: The Control Environment establishes the ethical foundation and tone at the top, critical for reliable internal controls.
28
Management wants to track whether IT projects are delivering business value, align IT with corporate goals, and ensure proper oversight over IT risks.
COBIT — Governance & Management Objectives Why: COBIT ensures IT is aligned with business strategy and manages IT-related risks effectively.
29
A company wants to prioritize cybersecurity improvements by first ensuring device inventory, restricting admin rights, and monitoring critical vulnerabilities.
Center for Internet Security Controls 1–6 (Inventory, Privilege Management, Continuous Vulnerability Management) Why: CIS Controls provide actionable, prioritized steps to improve security quickly and effectively.
30
A federal contractor must implement detailed security controls across access, audit logs, and system integrity to comply with government requirements.
National Institute of Standards and Technology SP 800-53 — Security Control Catalog (AC, AU, SI families) Why: SP 800-53 is a detailed, prescriptive catalog of controls required for regulated entities.
31
An organization wants a high-level, flexible cybersecurity framework to organize its Identify → Protect → Detect → Respond → Recover activities.
National Institute of Standards and Technology Cybersecurity Framework (CSF) Why: NIST CSF provides a strategic, flexible approach to manage cybersecurity risk across the entire lifecycle.
32
During an audit, a team observes that developers can move code to production without approval. Management wants to fix the gap to prevent unauthorized changes.
COSO — Control Activities Why: Control Activities ensure policies and procedures are enforced, preventing unauthorized or risky actions.
33
A company wants to show customers and regulators that it follows internationally recognized information security practices and can obtain formal certification.
International Organization for Standardization 27001 — Information Security Management System (ISMS) Why: ISO 27001 is a formal, certifiable security standard, ideal for external assurance.
34
A company is reviewing whether IT controls over financial reporting—like access restrictions and change management—are effective.
COSO — Information & Communication / Control Activities Why: COSO covers design, implementation, and monitoring of controls, including IT-related controls impacting financial reporting.
35
A small business wants a practical set of cybersecurity actions that can be implemented quickly without complex governance structures.
Center for Internet Security Controls — Implementation Groups 1–2 Why: CIS Controls provide simple, high-impact actions perfect for small or medium-sized organizations.
36
A federal contractor needs to demonstrate continuous compliance with specific security requirements for sensitive information and show detailed control adherence.
National Institute of Standards and Technology SP 800-53 — Continuous Monitoring & Security Control Families Why: SP 800-53 supports detailed, ongoing compliance monitoring, ensuring regulatory and security requirements are met.
37
A company is designing controls to ensure accurate financial reporting and reliable accounting systems.
COSO — Control Activities Why: Control Activities are the actual policies/procedures that ensure transactions are properly processed.
38
Management is focused on identifying enterprise-wide risks, including strategic and operational risks, not just financial reporting.
COSO ERM — Risk Assessment Why: COSO ERM expands beyond ICFR to enterprise-wide risk management, including strategy.
39
A company is evaluating risks related to migrating systems to the cloud, including vendor dependency and data security.
COSO ERM for Cloud — Risk Identification & Assessment Why: COSO ERM for Cloud focuses on cloud-specific risks like third-party reliance and data exposure.
40
A company wants to ensure IT investments deliver value and align with business goals.
COBIT — Governance Objectives Why: COBIT ensures IT supports business strategy and performance.
41
An organization is structuring its cybersecurity program around Identify, Protect, Detect, Respond, Recover.
National Institute of Standards and Technology CSF Why: That 5-step lifecycle is the core of NIST CSF.
42
A company wants to integrate risk management into strategic planning and decision-making.
COSO ERM — Strategy & Objective-Setting Why: COSO ERM links risk with strategy, not just controls.
43
A company wants to ensure relevant information flows to the right people for decision-making.
COSO — Information & Communication Why: This component ensures data is communicated effectively.
44
A company is implementing a program to detect and respond to cybersecurity incidents quickly.
National Institute of Standards and Technology CSF — Detect & Respond Why: These are core NIST CSF functions.
45
A company wants to ensure only authorized users have access to systems and privileges are limited appropriately.
Center for Internet Security Controls — Access Control Management Why: CIS emphasizes practical access restriction and privilege control.