Exam 7: Risk Management: Controlling Risk
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program55 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
The only use of the acceptance strategy that is recognized as valid by industry practicesoccurs when the organization has done all but which of the following?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
C
Which of the following can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
The Microsoft Risk Management Approach includes four phases.Which of the following is NOT one of them?
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
C
What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks?
(Multiple Choice)
4.8/5
(43)
The risk control strategy that attempts to shift risk to other assets,other processes,or other organizations is known as the defense risk controlstrategy.___________
(True/False)
4.8/5
(41)
In a cost-benefit analysis,the expected frequency of an attack,expressed on a per-year basis is known astheannualized risk of occurrence.____________
(True/False)
4.9/5
(39)
The calculated value associated with themost likely loss from a single attack.
(Multiple Choice)
4.8/5
(31)
The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident,disaster,or attack through effective contingency planning and preparation is known as the mitigation risk control strategy.____________
(True/False)
4.7/5
(49)
Once a control strategy has been selected and implemented,what should be done on an ongoing basis to determine their effectiveness and to estimate the remaining risk?
(Multiple Choice)
5.0/5
(32)
What should each information asset-threat pair have at a minimum that clearly identifies any residual risk that remains after the proposed strategy has been executed?
(Multiple Choice)
4.9/5
(34)
The ISO 27005 Standard for InfoSec Risk Management includes a five-stage management methodology; among them are risk treatment and risk communication.
(True/False)
4.8/5
(35)
The criterion most commonly used when evaluating a strategy to implement InfoSec controlsand safeguards is economic feasibility.
(True/False)
4.9/5
(46)
The formalassessment and presentation of the economic expenditures needed for a particular securitycontrol,contrasted with its projected value to the organization.
(Multiple Choice)
4.8/5
(40)
The defense risk control strategy may be accomplished by outsourcing to other organizations.
(True/False)
4.8/5
(30)
The quantity and nature of risk that organizations are willing to accept.
(Multiple Choice)
4.8/5
(36)
Unlike other risk management frameworks,FAIR relies on the qualitative assessment of many risk components using scales with value ranges.
(True/False)
4.8/5
(41)
A risk control strategy that attempts to eliminate or reduceany remaining uncontrolled risk through the application of additional controls and safeguards.
(Multiple Choice)
4.8/5
(45)
Which of the followingdescribes the financial savings from using the defense risk control strategy to implement a control and eliminate the financial ramifications of an incident?
(Multiple Choice)
4.9/5
(31)
Also known as an economic feasibility study,the formal assessment and presentation of the economic expenditures needed for a particular security control,contrasted with its projected value to the organization is known ascost-benefit analysis (CBA).____________
(True/False)
4.7/5
(34)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)