Exam 7: Risk Management: Controlling Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Briefly describe the five basic strategies to control risk that result from vulnerabilities.

(Essay)
4.7/5
(38)

By multiplying the asset value by the exposure factor,you can calculate which of the following?

(Multiple Choice)
4.7/5
(35)

Which of the following is NOT a valid rule of thumb on risk control strategy selection?

(Multiple Choice)
4.9/5
(45)

Due care and due diligence occur when an organization adopts a certain minimum level of security-that is,what any prudent organization would do in similar circumstances.____________

(True/False)
4.9/5
(36)

Describe operational feasibility.

(Essay)
4.8/5
(39)

A benchmark is derived by comparing measured actual performance against established standards for the measured category.____________ ​

(True/False)
4.8/5
(36)

The risk control strategy that seeks to reduce the impact of a successful attack through the use of IR,DR and BC plans is ____________________ .

(Short Answer)
4.8/5
(34)

The ISO 27005 Standard for Information Security Risk Management includes five stages including all but which of the following?

(Multiple Choice)
4.8/5
(40)

Once an organization has estimated the worth of various assets,what three questions must be asked to calculate the potential loss from the successful exploitation of a vulnerability?

(Essay)
4.8/5
(44)

A process of assigning financial value or worth to each information asset.

(Multiple Choice)
4.8/5
(31)

An examination of how well a particular solution fits within theorganization's strategic planning objectives and goals.

(Multiple Choice)
4.9/5
(37)

A risk control strategy that eliminates all risk associatedwith an information asset by removing it from service.

(Multiple Choice)
4.9/5
(33)

Explain two practical guidelines to follow in risk control strategy selection.

(Essay)
4.9/5
(46)

What is the result of subtracting the post-control annualized loss expectancy and the ACS from the pre-control annualized loss expectancy?

(Multiple Choice)
4.7/5
(35)

What are the four stages of a basic FAIR analysis?

(Essay)
4.8/5
(36)

An examination of how well a particular solution is supportable given the organization's current technological infrastructure and resources,which include hardware,software,networking,and personnel is known as operational feasibility.____________

(True/False)
4.8/5
(29)

To keep up with the competition organizations must design and create a ____________ environment in which business processes and procedures can function and evolve effectively.

(Short Answer)
4.8/5
(40)

Which of the following determines acceptable practices based on consensus and relationships among the communities of interest.

(Multiple Choice)
5.0/5
(50)

The risk control strategy that eliminates all risk associated with an information asset by removing it from service is known as the ​termination risk control strategy.

(True/False)
5.0/5
(35)

Risks can be avoided by countering the threats facing an asset or by eliminating the exposure of an asset.

(True/False)
4.9/5
(46)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)