Exam 8: Risk Management: Identifying and Assessing Risk
Exam 1: Introduction to the Management of Information Security139 Questions
Exam 2: Planning for Security123 Questions
Exam 3: Planning for Contingencies114 Questions
Exam 4: Information Security Policy133 Questions
Exam 5: Developing the Security Program133 Questions
Exam 6: Security Management Models120 Questions
Exam 7: Security Management Practices114 Questions
Exam 8: Risk Management: Identifying and Assessing Risk78 Questions
Exam 9: Risk Management: Controlling Risk105 Questions
Exam 10: Protection Mechanisms133 Questions
Exam 11: Personnel and Security133 Questions
Exam 12: Law and Ethics113 Questions
Select questions type
According to Sun Tzu - knowing yourself and your enemy "for every victory gained,you will suffer a defeat".
(True/False)
4.8/5
(43)
Determining the likelihood that vulnerable systems will be attacked by specific threats is part of the risk identification process._________________________
(True/False)
4.8/5
(31)
____________________ are specific areas in which threat agents can attack an information asset.
(Short Answer)
4.9/5
(38)
Risk Analysis is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be controlled or mitigated.
(True/False)
4.8/5
(34)
Organizations should have a data classification scheme categorizing information assets based on their sensitivity and security needs; for example: confidential,internal and public.
(True/False)
4.9/5
(41)
The final step in the risk identification process is to list the assets in order of cost,using a weighted factor analysis worksheet._________________________
(True/False)
4.8/5
(38)
What information signifies that a manufacturer performed an upgrade to a hardware component at their customer's premises?
(Multiple Choice)
4.9/5
(43)
The ____ community best understands threats and attacks that put an organization at risk.
(Multiple Choice)
4.8/5
(36)
Assigning a value to each information asset is part of the identification process._________________________
(True/False)
4.9/5
(35)
As part of the risk identification process,listing the assets in order of importance can be achieved by using a weighted ____________________ worksheet.
(Short Answer)
4.8/5
(37)
Assessing risks includes determining the ____________________ that vulnerable systems will be attacked by specific threats.
(Short Answer)
4.9/5
(39)
As each information asset is identified,categorized,and ____,a relative value must also be assigned to it.
(Multiple Choice)
5.0/5
(33)
Piracy and copyright infringement are examples of the threat of compromise to ____________________ property.
(Short Answer)
4.8/5
(40)
Risk is the likelihood of the occurrence of a(n)____ multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability.
(Multiple Choice)
4.8/5
(46)
As each information asset is identified,____________________,and classified,a relative value must also be assigned to it.
(Short Answer)
4.9/5
(28)
After a peak in 2000,the number of organizations reporting unauthorized use of computer systems has been declining steadily; the amount reporting no unauthorized access has been increasing._________________________
(True/False)
5.0/5
(39)
Briefly describe any three standard IT system components and their respective risk management components.
(Essay)
4.9/5
(36)
Which of the following activities is part of the risk assessment process?
(Multiple Choice)
4.9/5
(35)
Likelihood is the overall rating of the probability that a specific vulnerability will be exploited.
(True/False)
4.8/5
(37)
Which of the following describes an attribute that displays where an asset can be found on an organization's network?
(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 78
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)