Exam 8: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

During risk identification managers identify the organization's information assets,classify and categorize them into useful groups,and prioritize them by their overall importance._________________________

(True/False)
4.8/5
(31)

The amount of danger posed by a threat is sometimes difficult to assess.It may be simply the impact of a threat attacking the organization,or it may reflect the amount of damage that the threat could create or the frequency with which an attack can occur._________________________

(True/False)
5.0/5
(38)

A TVA spreadsheet combines prioritized lists of assets and threats to identify vulnerabilities and provide a prioritized list of efforts relating to the implementation of needed controls.

(True/False)
4.8/5
(28)

Which of the following attributes does not apply to software information assets?

(Multiple Choice)
4.9/5
(32)

A(n)comprehensive classification of information assets means that all inventoried assets fit into a category._________________________

(True/False)
4.8/5
(33)

Which of the following distinctly identifies an asset and can be vital in later analysis of threats directed to specific models of certain devices or software components?

(Multiple Choice)
4.9/5
(42)

The ____ uniquely identifies a specific device.

(Multiple Choice)
4.9/5
(39)

One of the calculations that guides corporate spending on controls is the cost of ____ operations if an attack occurs and is successful.

(Multiple Choice)
4.8/5
(39)

The process of evaluating potential weaknesses in each information asset is known as ____________________ identification.

(Short Answer)
5.0/5
(39)

Which of the following is an example of human error?

(Multiple Choice)
4.9/5
(30)

Which of the following activities is part of the risk identification process?

(Multiple Choice)
4.8/5
(37)

____ should be avoided when identifying people assets.

(Multiple Choice)
4.9/5
(31)

Information technology managers and technicians are the defenders of information._________________________

(True/False)
4.9/5
(41)

When determining the relative importance of each information asset,refer to the organization's ____ or statement of objectives.From this source,determine which assets are essential for meeting the organization's objectives,which assets support the objectives,and which are merely adjuncts.

(Multiple Choice)
4.9/5
(36)

A well-developed risk management program consists of two formal processes: risk identification and assessment and risk control._________________________

(True/False)
4.9/5
(30)

To make the process of analyzing threats less daunting,steps in the threat and vulnerability identification processes should be handled jointly.

(True/False)
4.7/5
(37)

The first stage in the Risk Identification process is to develop an inventory of information assets.

(True/False)
4.9/5
(40)

____ is the identification and assessment of levels of risk in the organizations?

(Multiple Choice)
4.8/5
(37)
Showing 61 - 78 of 78
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)