Exam 9: Risk Management: Controlling Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Mitigation of risk involves applying safeguards that eliminate or reduce the remaining uncontrolled risks._________________________

(True/False)
4.9/5
(37)

One of the most common methods of obtaining user acceptance and support is via ____.

(Multiple Choice)
4.8/5
(38)

Management consultants Tom Peters and Robert Waterman assert that one of the eight characteristics of excellent organizations is that they "stick to their knitting",which means ____.

(Multiple Choice)
4.8/5
(34)

Residual risk is also known as risk tolerance and is the amount of risk organizations are willing to accept after all reasonable controls have been implemented.

(True/False)
4.8/5
(37)

The effectiveness of controls should be ____________________ and measured regularly once a control strategy has been selected.

(Short Answer)
4.8/5
(42)

____ is the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility.

(Multiple Choice)
5.0/5
(36)

Due care and due diligence occur when an organization adopts a certain minimum level of security as what any ____ organization would do in similar circumstances.

(Multiple Choice)
4.8/5
(35)

Organizations can establish a competitive business model,method,or technique allowing it to provide a product or service that is superior in some way creating competitive disadvantage._________________________

(True/False)
5.0/5
(38)

ISO ____ is the ISO standard for the performance of risk management,and includes a five-stage risk management methodology.

(Multiple Choice)
4.8/5
(42)

Economic and non-economic effects of a weakness must be evaluated after a strategy for dealing with a particular vulnerability has been selected.

(True/False)
4.8/5
(29)

The goal of information security is to bring residual risk in line with an organization's risk appetite._________________________

(True/False)
4.7/5
(41)

A cost benefit analysis (CBA)result is obtained from the difference between the pre-control and the ____________________ annualized loss expectancy (ALE).

(Short Answer)
4.8/5
(36)

Discuss at least four alternatives to feasibility.

(Essay)
4.8/5
(30)

Avoidance of risk is accomplished through the application of procedures,training and education and the implementation of technical security controls and safeguards._________________________

(True/False)
4.8/5
(34)

Which of the following is NOT an alternative to cost-benefit analyses?

(Multiple Choice)
4.9/5
(35)

Unlike other risk management frameworks,FAIR relies on the ____ assessment of many risk components using scales with value ranges,for example very high to very low.

(Multiple Choice)
4.8/5
(38)

In Risk Management is asset valuation,as it is relatively easy to determine accurately the true value of information and information-bearing assets.

(True/False)
4.9/5
(44)

Unlike other risk management frameworks,FAIR relies on the qualitative assessment of many risk components using scales with value ranges,for example very high to very low.

(True/False)
4.8/5
(45)

One of the most common methods of obtaining user acceptance and support is via user ____________________ .

(Short Answer)
4.9/5
(32)

The risk control strategy that seeks to reduce the impact of a successful attack through the use of IR,DR and BC plans is ____________________ .

(Short Answer)
4.7/5
(34)
Showing 41 - 60 of 105
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)