Exam 6: Risk Management: Identifying and Assessing Risk
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
Why is threat identification so important in the process of risk management?
Free
(Essay)
4.8/5
(37)
Correct Answer:
Any organization typically faces a wide variety of threats.If you assume that every threat can and will attack every information asset,then the project scope becomes too complex.To make the process less unwieldy,each step in the threat identification and vulnerability identification processes is managed separately and then coordinated at the end.At every step,the manager is called on to exercise good judgment and draw on experience to make the process function smoothly.
An estimate made by the manager using good judgement and experience can account for which factor of risk assessment?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
MAC addresses are considered a reliable identifier for devices with network interfaces,since they are essentially foolproof.
Free
(True/False)
4.9/5
(37)
Correct Answer:
False
Classification categories must be ____________________ and mutually exclusive.
(Short Answer)
4.8/5
(37)
Discuss the trends in frequency of attacks and how that plays into a risk management strategy.
(Essay)
4.8/5
(40)
Two of the activities involved in risk management include identifying risks and assessing risks.Which of the following activities is part of the risk identification process?
(Multiple Choice)
4.8/5
(35)
The recognition,enumeration,and documentation of risks to anorganization's information assets.is known as risk control.____________
(True/False)
4.9/5
(42)
The probability that a specific vulnerability within an organization will be the targetof an attack is known as risk.____________
(True/False)
4.7/5
(36)
As part of the risk identification process,listing the assets in order of importance can be achieved by using a weighted ____________________ worksheet.
(Short Answer)
4.7/5
(41)
Once an information asset is identified,categorized,and classified,what must also be assigned to it?
(Multiple Choice)
4.9/5
(36)
Assessing risks includes determining the ____________________ that vulnerable systems will be attacked by specific threats.
(Short Answer)
4.8/5
(32)
Which of the following attributes does NOT apply to software information assets?
(Multiple Choice)
4.9/5
(45)
An approach to combining risk identification,risk assessment,and risk appetite into a single strategy.
(Multiple Choice)
4.8/5
(39)
The information technology management community of interest often takes on the leadership role in addressing risk. ____________
(True/False)
4.7/5
(43)
Which of the following distinctly identifies an asset and can be vital in later analysis of threats directed to specific models of certain devices or software components?
(Multiple Choice)
4.8/5
(38)
Risk ____________ is the process of discovering and assessing the risks to an organization's operations and determining how those risks can be mitigated.
(Short Answer)
4.8/5
(33)
The identification and assessment of levels of risk in an organization describes which of the following?
(Multiple Choice)
4.9/5
(30)
An evaluation of the dangers to information assets,including adetermination of their potential to endanger the organization.
(Multiple Choice)
4.7/5
(44)
How should the initial inventory be used when classifying and categorizing assets?
(Essay)
4.9/5
(34)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)