Exam 8: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

According to Sun Tzu - knowing yourself and your enemy "for every victory gained,you will suffer a defeat".

(True/False)
4.8/5
(43)

Determining the likelihood that vulnerable systems will be attacked by specific threats is part of the risk identification process._________________________

(True/False)
4.8/5
(31)

____________________ are specific areas in which threat agents can attack an information asset.

(Short Answer)
4.9/5
(38)

Risk Analysis is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be controlled or mitigated.

(True/False)
4.8/5
(34)

Organizations should have a data classification scheme categorizing information assets based on their sensitivity and security needs; for example: confidential,internal and public.

(True/False)
4.9/5
(41)

The final step in the risk identification process is to list the assets in order of cost,using a weighted factor analysis worksheet._________________________

(True/False)
4.8/5
(38)

What information signifies that a manufacturer performed an upgrade to a hardware component at their customer's premises?

(Multiple Choice)
4.9/5
(43)

The ____ community best understands threats and attacks that put an organization at risk.

(Multiple Choice)
4.8/5
(36)

Assigning a value to each information asset is part of the identification process._________________________

(True/False)
4.9/5
(35)

As part of the risk identification process,listing the assets in order of importance can be achieved by using a weighted ____________________ worksheet.

(Short Answer)
4.8/5
(37)

Assessing risks includes determining the ____________________ that vulnerable systems will be attacked by specific threats.

(Short Answer)
4.9/5
(39)

As each information asset is identified,categorized,and ____,a relative value must also be assigned to it.

(Multiple Choice)
5.0/5
(33)

Piracy and copyright infringement are examples of the threat of compromise to ____________________ property.

(Short Answer)
4.8/5
(40)

Risk is the likelihood of the occurrence of a(n)____ multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability.

(Multiple Choice)
4.8/5
(46)

As each information asset is identified,____________________,and classified,a relative value must also be assigned to it.

(Short Answer)
4.9/5
(28)

After a peak in 2000,the number of organizations reporting unauthorized use of computer systems has been declining steadily; the amount reporting no unauthorized access has been increasing._________________________

(True/False)
5.0/5
(39)

Briefly describe any three standard IT system components and their respective risk management components.

(Essay)
4.9/5
(36)

Which of the following activities is part of the risk assessment process?

(Multiple Choice)
4.9/5
(35)

Likelihood is the overall rating of the probability that a specific vulnerability will be exploited.

(True/False)
4.8/5
(37)

Which of the following describes an attribute that displays where an asset can be found on an organization's network?

(Multiple Choice)
4.9/5
(34)
Showing 41 - 60 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)