Match ALE, BCP, RPO, risk transference, and other key risk management concepts to their definitions.
Drag & Match πDrag 14 real-world scenarios into the correct NIST RMF step: Prepare, Categorize, Select, Implement, Assess, Authorize, Monitor.
Categorize β οΈMatch threat source, threat vector, vulnerability, threat event, asset, impact, and risk to their precise NIST SP 800-30 definitions.
Drag & Match πGet these right: Internal, External, Second-Party, and Third-Party audits. A clear exam trap β especially third-party.
Drag & Match πΊοΈMatch Strategic, Tactical, Operational, and Roadmap planning levels to their NIST Tier and COBIT alignment definitions.
Drag & Match π§Sort 10 real exam scenarios into the correct lens β CISSP/ISC2 or CISM/ISACA. ISC2 builds security. ISACA governs it.
Drag & Sort πMatch Policy, Standard, Guideline, Procedure, and Baseline to their definitions. Know what's directive vs enforceable.
Drag & Match