Exam 8: Risk Management: Identifying and Assessing Risk
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
The ____ is an attribute that can be helpful in analyzing threat outbreaks when certain manufacturers announce specific vulnerabilities.
Free
(Multiple Choice)
4.9/5
(47)
Correct Answer:
C
Almost every organization is aware of its image in the local,national,and international spheres.Loss or ____ of some assets would prove especially embarrassing.
Free
(Multiple Choice)
4.8/5
(24)
Correct Answer:
C
The ____ is an effective attribute for tracking network devices and servers,but rarely applies to software.
Free
(Multiple Choice)
5.0/5
(31)
Correct Answer:
D
Assessing risks includes assigning a value to each information asset.
(True/False)
4.8/5
(27)
The inventory should also reflect the ____________________ and security priority assigned to each information asset.
(Short Answer)
4.7/5
(35)
The ultimate goal of risk identification is to assess the circumstances and setting of each information asset to reveal any threats._________________________
(True/False)
4.7/5
(42)
The ____ is also referred to as an electronic serial number.
(Multiple Choice)
4.8/5
(32)
____________________ is the overall rating-a numerical value on a defined scale-of the probability that a specific vulnerability will be exploited.
(Short Answer)
4.8/5
(37)
Risk management is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be ____________________.
(Short Answer)
4.9/5
(38)
The final step in the risk identification process is to list the assets in order of importance.This goal can be achieved by using a(n)____ worksheet.
(Multiple Choice)
4.9/5
(35)
The process of assigning relative values to information assets helps to ensure that assets with higher values are protected first.
(True/False)
4.7/5
(29)
Risk is the likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability._________________________
(True/False)
4.9/5
(33)
Weighting criteria can be used to assess the value of information assets or impact evaluation._________________________
(True/False)
4.9/5
(38)
A(n)____________________ number uniquely identifies a specific device.
(Short Answer)
4.7/5
(33)
Which of the following is the final step in the risk identification process of information assets?
(Multiple Choice)
4.8/5
(39)
The information technology community often takes on the leadership role in addressing risk.
(True/False)
4.9/5
(31)
Each component of an IT system has information of value during the risk identification process.These components include people,policies,data,software,hardware and networking.
(True/False)
4.8/5
(30)
The simple classification scheme for an information asset of confidential,____ and public,designates the level of protection needed for a particular information asset.
(Multiple Choice)
4.8/5
(36)
The last stage in the risk identification process is to document the organization's ____________________.
(Short Answer)
4.7/5
(33)
The data classification scheme for an information asset could include confidential,internal,and private.Each of these classification categories designates the level of protection needed for a particular information asset._________________________
(True/False)
4.7/5
(39)
Showing 1 - 20 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)