1:00
en
CR
RCAW
10
DPO : In case of Cross-border data transfer, you must seek ___ clearance to ensure Data privacy laws are not violated
COB : Your office area has encountered an earthquake and Citi office has been temporarily closed. In such case, business continues to operate as per ___ plan
CAP : ___ refers to the plan that contains corrective action details which explains how an issue will be mitigated
CSI : ____ is the primary inventory system for all applications in Citigroup
PQA : ____ team is responsible for Quality Assurance that measures process compliance and artifact quality, as defined in CITMS
MCA : A control assessment framework, basis which a manager provides his assessment on Controls that his business uses
CONTROL : Inorder to manage a RISK, you need to define a __________
IBAM : An Issue classification that refers to those issues that Management is already addressing and that which fulfills the 5 criteria defined by Internal Audit
ICAPS : All Issues/ CAPs that are raised are registered in ______ system
ISRP : ____ is the IS Review Process that is performed by ISO team
NCI : PQA team raises a ____ against a project if they find non-compliance to Citi Project Quality Assurance standards
EOVS : When a product has reached ____, it means vendor will no longer offer support for its product
SIRT : In Citi, when an Information Security Incident occurs, a _____ is raised
TPISA : Citi IS performs ______ assessment on 3rd party service providers who handle Confidential or higher information as security control
AVA : _____ is a test performed on an application to proactively identify its vulnerability to any IS threat
RCAW
Across:2. | In case of Cross-border data transfer, you must seek ___ clearance to ensure Data privacy laws are not violated | 3. | In Citi, when an Information Security Incident occurs, a _____ is raised | 4. | A control assessment framework, basis which a manager provides his assessment on Controls that his business uses |
| 7. | An Issue classification that refers to those issues that Management is already addressing and that which fulfills the 5 criteria defined by Internal Audit | 9. | ____ team is responsible for Quality Assurance that measures process compliance and artifact quality, as defined in CITMS |
| | Down:1. | Citi IS performs ______ assessment on 3rd party service providers who handle Confidential or higher information as security control | 5. | Your office area has encountered an earthquake and Citi office has been temporarily closed. In such case, business continues to operate as per ___ plan | 6. | ___ refers to the plan that contains corrective action details which explains how an issue will be mitigated |
| 7. | All Issues/ CAPs that are raised are registered in ______ system | 8. | _____ is a test performed on an application to proactively identify its vulnerability to any IS threat |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only
RCAW
Across:2. | In case of Cross-border data transfer, you must seek ___ clearance to ensure Data privacy laws are not violated | 3. | In Citi, when an Information Security Incident occurs, a _____ is raised | 4. | A control assessment framework, basis which a manager provides his assessment on Controls that his business uses |
| 7. | An Issue classification that refers to those issues that Management is already addressing and that which fulfills the 5 criteria defined by Internal Audit | 9. | ____ team is responsible for Quality Assurance that measures process compliance and artifact quality, as defined in CITMS |
| | Down:1. | Citi IS performs ______ assessment on 3rd party service providers who handle Confidential or higher information as security control | 5. | Your office area has encountered an earthquake and Citi office has been temporarily closed. In such case, business continues to operate as per ___ plan | 6. | ___ refers to the plan that contains corrective action details which explains how an issue will be mitigated |
| 7. | All Issues/ CAPs that are raised are registered in ______ system | 8. | _____ is a test performed on an application to proactively identify its vulnerability to any IS threat |
| |
© 2013
PuzzleFast.com, Noncommercial Use Only