Exam 15: Risk Mitigation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What type of learner tends to sit in the middle of the class and learns best through lectures and discussions?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

B

What is privilege management?

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

Privilege management is the process of assigning and revoking privileges to objects;that is,it covers the procedures of managing object authorizations.

Contrast the difference between a pedagogical approach versus an andragogical approach to subject matter.

Free
(Essay)
4.8/5
(23)
Correct Answer:
Verified

In a pedagogical approach,the subject matter is defined by what the teacher wants to give.In an andragogical approach,learning is organized around situations in life or at work.

What describes an agreement between two or more parties and demonstrates a "convergence of will" between the parties?so that they can work together?

(Multiple Choice)
4.8/5
(31)

Why should authorization be obtained for penetration testing and vulnerability testing?

(Essay)
4.9/5
(36)

Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of networks?

(Multiple Choice)
4.8/5
(40)

Select the specific type of interview that is usually conducted when an employee leaves the company?

(Multiple Choice)
4.8/5
(27)

What are the two risk calculation formulas commonly used to calculate expected losses?

(Essay)
4.8/5
(34)

What is mean time to recovery (MTTR)?

(Essay)
4.8/5
(38)

Which of the following is a basic measure of reliability for systems that cannot be repaired?

(Multiple Choice)
4.9/5
(38)

A physical control attempts to discourage security violations before they occur.

(True/False)
4.8/5
(37)

Explain how continuous monitoring can benefit an IT enterprise's operations.

(Essay)
4.7/5
(33)

What is a risk register?

(Essay)
4.7/5
(42)

The FIT calculation is another way of reporting MTTF.

(True/False)
5.0/5
(31)

Which of the following is considered to be a common security issue? (Choose all that apply. )

(Multiple Choice)
4.8/5
(35)

What term can be described as a function of threats,consequences of those threats,and the resulting vulnerabilities?

(Multiple Choice)
4.7/5
(35)

Many cloud providers allow customers to perform penetration tests and vulnerability scans without permission and whenever is necessary.

(True/False)
4.9/5
(31)

A collection of suggestions that should be implemented is referred to as a:

(Multiple Choice)
4.8/5
(33)

Distributive allocation refers to "eliminating" the risk.

(True/False)
4.8/5
(30)

Select the option that best describes a policy:

(Multiple Choice)
4.7/5
(45)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)