Exam 8: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ is an attribute that can be helpful in analyzing threat outbreaks when certain manufacturers announce specific vulnerabilities.

Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
Verified

C

Almost every organization is aware of its image in the local,national,and international spheres.Loss or ____ of some assets would prove especially embarrassing.

Free
(Multiple Choice)
4.8/5
(24)
Correct Answer:
Verified

C

The ____ is an effective attribute for tracking network devices and servers,but rarely applies to software.

Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
Verified

D

Assessing risks includes assigning a value to each information asset.

(True/False)
4.8/5
(27)

The inventory should also reflect the ____________________ and security priority assigned to each information asset.

(Short Answer)
4.7/5
(35)

The ultimate goal of risk identification is to assess the circumstances and setting of each information asset to reveal any threats._________________________

(True/False)
4.7/5
(42)

The ____ is also referred to as an electronic serial number.

(Multiple Choice)
4.8/5
(32)

____________________ is the overall rating-a numerical value on a defined scale-of the probability that a specific vulnerability will be exploited.

(Short Answer)
4.8/5
(37)

Risk management is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be ____________________.

(Short Answer)
4.9/5
(38)

The final step in the risk identification process is to list the assets in order of importance.This goal can be achieved by using a(n)____ worksheet.

(Multiple Choice)
4.9/5
(35)

The process of assigning relative values to information assets helps to ensure that assets with higher values are protected first.

(True/False)
4.7/5
(29)

Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability._________________________

(True/False)
4.9/5
(33)

Weighting criteria can be used to assess the value of information assets or impact evaluation._________________________

(True/False)
4.9/5
(38)

A(n)____________________ number uniquely identifies a specific device.

(Short Answer)
4.7/5
(33)

Which of the following is the final step in the risk identification process of information assets?

(Multiple Choice)
4.8/5
(39)

The information technology community often takes on the leadership role in addressing risk.

(True/False)
4.9/5
(31)

Each component of an IT system has information of value during the risk identification process.These components include people,policies,data,software,hardware and networking.

(True/False)
4.8/5
(30)

The simple classification scheme for an information asset of confidential,____ and public,designates the level of protection needed for a particular information asset.

(Multiple Choice)
4.8/5
(36)

The last stage in the risk identification process is to document the organization's ____________________.

(Short Answer)
4.7/5
(33)

The data classification scheme for an information asset could include confidential,internal,and private.Each of these classification categories designates the level of protection needed for a particular information asset._________________________

(True/False)
4.7/5
(39)
Showing 1 - 20 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)