Exam 7: Risk Management: Controlling Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The goal of InfoSec is not to bring residual risk to zero; rather,it is to bring residual risk in line with an organization's risk ___________.

(Short Answer)
4.8/5
(38)

In which technique does a group rate or rank a set of information,compile the results and repeat until everyone is satisfied with the result?

(Multiple Choice)
4.9/5
(34)

What is the OCTAVE method approach to risk management?

(Essay)
4.8/5
(40)

Which of the following affects the cost of a control?

(Multiple Choice)
4.8/5
(35)

The NIST risk management approach includes all but which of the following elements?

(Multiple Choice)
4.8/5
(31)

The financial savings from using the defense risk control strategy to implementa control and eliminate the financial ramifications of an incident.

(Multiple Choice)
4.9/5
(43)

A risk control strategy that attempts to reduce the impactof the loss caused by a realized incident,disaster,or attack through effective contingencyplanning and preparation.

(Multiple Choice)
4.9/5
(42)

Which of the following is not a step in the FAIR risk management framework?

(Multiple Choice)
5.0/5
(38)

Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?

(Multiple Choice)
4.7/5
(30)

The risk control strategy that indicates the organization is willing to accept the current level of risk.As a result,the organization makes a conscious decision to do nothing to protect an information asset from risk and to accept the outcome from any resulting exploitation is known as the termination risk control strategy.

(True/False)
4.8/5
(44)

What does the result of a CBA determine?What is the formula for the CBA?

(Essay)
4.8/5
(37)

The risk control strategy that attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards is the protect risk control strategy,also known as the avoidance strategy.____________

(True/False)
4.9/5
(29)

Which of the following is NOT an alternative to using CBA to justify risk controls?

(Multiple Choice)
4.8/5
(35)

What are the four phases of the Microsoft risk management strategy?

(Essay)
4.8/5
(32)

When a vulnerability (flaw or weakness)exists in an important asset,implement security controls to reduce the likelihood of a vulnerability being ___________.

(Short Answer)
4.9/5
(32)

Which of the following describes an organization's efforts to reduce damage caused by a realized incident or disaster?

(Multiple Choice)
4.9/5
(40)

A risk control strategy that indicates the organization iswilling to accept the current level of risk and that the organization makes a conscious decisionto do nothing to protect an information asset from risk and to accept the outcome from anyresulting exploitation.

(Multiple Choice)
4.9/5
(41)

The ____________________ risk control strategy attempts to shift the risk to other assets,processes,or organizations.

(Short Answer)
4.7/5
(28)

Application of training and education is a common method of which risk control strategy?

(Multiple Choice)
5.0/5
(36)

Describe the use of hybrid assessment to create a quantitative assessment of asset value.

(Essay)
4.8/5
(31)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)