Exam 9: Risk Management: Controlling Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ technique,named for the Greek mythological oracle which predicted the future is a process whereby a group rates or ranks a set of information.

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

D

At a minimum,each information asset-threat pair should have a(n)____ that clearly identifies any residual risk that remains after the proposed strategy has been executed.

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

B

According to the Microsoft Risk Management Approach,risk management is not a stand-alone subject and should be part of a general governance program to allow the organization's management to evaluate the organization's operations and make better,more informed decisions.

Free
(True/False)
4.8/5
(42)
Correct Answer:
Verified

True

When you establish one control,you increase the risk associated with all subsequent control evaluations._________________________

(True/False)
4.8/5
(34)

____ is the money saved by avoiding,via the implementation of a control,the financial ramifications of an incident.

(Multiple Choice)
4.7/5
(24)

The four categories of controlling risk include avoidance,mitigation,transference and _____.

(Multiple Choice)
4.9/5
(37)

The threat level and an asset's ____________________ should be a major factor in the risk control strategy selection.

(Short Answer)
4.9/5
(32)

Risk ____________________ defines the quantity and nature of risk that an organization is willing to accept.

(Short Answer)
4.8/5
(34)

____ is the process of assigning financial value or worth to each information component.

(Multiple Choice)
4.8/5
(34)

The ____________________ technique is process in which a group ranks a set of information.

(Short Answer)
4.8/5
(37)

The Annualized Loss Expectancy in the CBA formula is determined as ____.

(Multiple Choice)
4.7/5
(28)

Risk appetite is also known as risk ____________________.

(Short Answer)
4.9/5
(35)

The ____________________ assessment,tries to improve upon the ambiguity of qualitative measures without resorting to the unsubstantiated estimation used for quantitative measures.

(Short Answer)
4.8/5
(29)

The ISO 27005 Standard for Information Security Risk Management includes five stages including all but which of the following?

(Multiple Choice)
4.8/5
(38)

An organization that chooses to outsource its risk management practice to independent consultants is taking the ____ control approach.

(Multiple Choice)
4.8/5
(36)

An alternate set of possible risk control strategies includes all but which of the following?

(Multiple Choice)
4.8/5
(40)

Reducing the impact of a successful attack on an organization's system falls under the ____ risk control strategy.

(Multiple Choice)
4.9/5
(32)

Briefly describe the four basic strategies to control risk that result from vulnerabilities.

(Essay)
5.0/5
(32)

OCTAVE is an InfoSec risk evaluation methodology that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls.

(True/False)
4.9/5
(42)

What is a cost/benefit analysis and how is it calculated?

(Essay)
4.9/5
(43)
Showing 1 - 20 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)