Exam 7: Risk Management: Controlling Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The only use of the acceptance strategy that is recognized as valid by industry practicesoccurs when the organization has done all but which of the following?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

Which of the following can be described as the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility?

Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
Verified

B

The Microsoft Risk Management Approach includes four phases.Which of the following is NOT one of them?

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks?

(Multiple Choice)
4.8/5
(43)

The risk control strategy that attempts to shift risk to other assets,other processes,or other organizations is known as the defense risk controlstrategy.___________

(True/False)
4.8/5
(41)

In a cost-benefit analysis,the expected frequency of an attack,expressed on a per-year basis is known as​theannualized risk of occurrence.____________

(True/False)
4.9/5
(39)

The calculated value associated with themost likely loss from a single attack.

(Multiple Choice)
4.8/5
(31)

The risk control strategy that attempts to reduce the impact of the loss caused by a realized incident,disaster,or attack through effective contingency planning and preparation is known as the mitigation risk control strategy.____________

(True/False)
4.7/5
(49)

Once a control strategy has been selected and implemented,what should be done on an ongoing basis to determine their effectiveness and to estimate the remaining risk?

(Multiple Choice)
5.0/5
(32)

What should each information asset-threat pair have at a minimum that clearly identifies any residual risk that remains after the proposed strategy has been executed?

(Multiple Choice)
4.9/5
(34)

The ISO 27005 Standard for InfoSec Risk Management includes a five-stage management methodology; among them are risk treatment and risk communication.

(True/False)
4.8/5
(35)

The criterion most commonly used when evaluating a strategy to implement InfoSec controlsand safeguards is economic feasibility.

(True/False)
4.9/5
(46)

The formalassessment and presentation of the economic expenditures needed for a particular securitycontrol,contrasted with its projected value to the organization.

(Multiple Choice)
4.8/5
(40)

The defense risk control strategy may be accomplished by outsourcing to other organizations.

(True/False)
4.8/5
(30)

The quantity and nature of risk that organizations are willing to accept.

(Multiple Choice)
4.8/5
(36)

Unlike other risk management frameworks,FAIR relies on the qualitative assessment of many risk components using scales with value ranges.

(True/False)
4.8/5
(41)

A risk control strategy that attempts to eliminate or reduceany remaining uncontrolled risk through the application of additional controls and safeguards.

(Multiple Choice)
4.8/5
(45)

Which of the followingdescribes the financial savings from using the defense risk control strategy to implement a control and eliminate the financial ramifications of an incident?

(Multiple Choice)
4.9/5
(31)

Also known as an economic feasibility study,the formal assessment and presentation of the economic expenditures needed for a particular security control,contrasted with its projected value to the organization is known ascost-benefit analysis (CBA).____________

(True/False)
4.7/5
(34)

Discuss three alternatives to feasibility analysis.

(Essay)
5.0/5
(38)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)