Exam 6: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The process of identifying risk,assessing its relative magnitude,and taking steps to reduce it to an acceptable level.

Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
Verified

A

Classification categories must be mutually exclusive and which of the following? 

Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
Verified

C

Once an information asset is identified,categorized,and classified,what must also be assigned to it? 

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

For the purposes of relative risk assessment how is risk calculated?

(Essay)
4.8/5
(26)

As part of the risk identification process,listing the assets in order of importance can be achieved by using a weighted ____________________ worksheet.

(Short Answer)
4.8/5
(34)

Which of the following is a network device attribute that may be used in conjunction with DHCP,making asset-identification using this attribute difficult? 

(Multiple Choice)
4.8/5
(36)

Which of the following is an example of a technological obsolescence threat? 

(Multiple Choice)
4.7/5
(37)

Having an established risk management program means that an organization's assets are completely protected.

(True/False)
4.8/5
(41)

Briefly describe any three standard categories of information asset and their respective risk management components.

(Essay)
4.8/5
(37)

MAC addresses are considered a reliable identifier for devices with network interfaces,since they are essentially foolproof.

(True/False)
4.7/5
(37)

The identification and assessment of levels of risk in an organization describes which of the following? 

(Multiple Choice)
4.8/5
(30)

Two of the activities involved in risk management include identifying risks and assessing risks.Which of the following activities is part of the risk identification process? 

(Multiple Choice)
4.9/5
(30)

​The secretarial community often takes on the leadership role in addressing risk.

(True/False)
4.9/5
(29)

What strategic role do the InfoSec and IT communities play in risk management?  Explain.

(Essay)
4.9/5
(30)

What is the final step in the risk identification process? 

(Multiple Choice)
4.8/5
(38)

Some threats can manifest in multiple ways,yielding multiple exploits for an asset-threat pair.​

(True/False)
4.7/5
(32)

What is defined as specific avenues that threat agents can exploit to attack an information asset? 

(Multiple Choice)
4.9/5
(32)

Data classification schemes should categorize information assets based on which of the following? 

(Multiple Choice)
4.9/5
(39)

Which of the following distinctly identifies an asset and can be vital in later analysis of threats directed to specific models of certain devices or software components? 

(Multiple Choice)
4.8/5
(36)

Occurs when a manufacturer performs an upgrade to a hardware component at the customer's premises.

(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)