Exam 6: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The quantity and nature of risk that organizations are willing to accept.

(Multiple Choice)
4.9/5
(38)

What strategic role do the InfoSec and IT communities play in risk management?Explain.

(Essay)
4.7/5
(40)

The InfoSec community often takes on the leadership role in addressing risk.

(True/False)
4.8/5
(34)

Determining the cost of recovery from an attack is one calculation that must be made to identify risk,what is another?

(Multiple Choice)
4.8/5
(44)

An asset valuation approach that uses categorical or nonnumeric values rather than absolute numerical measures.

(Multiple Choice)
4.9/5
(31)

Data classification schemes should categorize information assets based on which of the following?

(Multiple Choice)
4.8/5
(41)

Which of the following is NOT among the typical columns in the ranked vulnerability risk worksheet?

(Multiple Choice)
4.9/5
(38)

Occurs when a manufacturer performs an upgrade to a hardware component at the customer's premises.

(Multiple Choice)
4.9/5
(39)

An asset valuation approach that uses categorical or nonnumericvalues rather than absolute numerical measures is known as numberless assessment.____________

(True/False)
4.8/5
(45)

Two of the activities involved in risk management include identifying risks and assessing risks.Which of the following activities is part of the risk assessment process?

(Multiple Choice)
4.8/5
(35)

The Australian and New Zealand Risk Management Standard 4360 uses qualitative methods to determine risk based on a threat's probability of occurrence and expected results of a successful attack.

(True/False)
4.8/5
(28)

Briefly describe any three standard categories of information asset and their respective risk management components.

(Essay)
4.9/5
(30)

Some threats can manifest in multiple ways,yielding multiple vulnerabilities for an asset-threat pair.

(True/False)
4.8/5
(33)

What does it mean to 'know the enemy' with respect to risk management?

(Essay)
4.8/5
(31)

Describe the use of an IP address when deciding which attributes to track for each information asset.

(Essay)
4.9/5
(32)

Which of the following is an attribute of a network device is physically tied to the network interface?

(Multiple Choice)
4.9/5
(33)

The process of identifying risk,assessing its relative magnitude,and takingsteps to reduce it to an acceptable level.

(Multiple Choice)
4.8/5
(42)

A prioritized lists ofassets and threats can be combined with exploit information into a specialized report known as a TVA worksheet​.____________

(True/False)
4.9/5
(31)

Each manager in the organization should focus on reducing risk.This is often done within the context of one of the three communities of interest,which includes all but which of the following?

(Multiple Choice)
4.9/5
(41)

What is the final step in the risk identification process?

(Multiple Choice)
4.8/5
(28)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)