Exam 6: Risk Management: Identifying and Assessing Risk
Exam 1: Introduction to the Management of Information Security63 Questions
Exam 2: Compliance: Law and Ethics50 Questions
Exam 3: Governance and Strategic Planning for Security52 Questions
Exam 4: Information Security Policy56 Questions
Exam 5: Developing the Security Program65 Questions
Exam 6: Risk Management: Identifying and Assessing Risk60 Questions
Exam 7: Risk Management: Controlling Risk60 Questions
Exam 8: Security Management Models60 Questions
Exam 9: Security Management Practices59 Questions
Exam 10: Planning for Contingencies60 Questions
Exam 11: Personnel and Security60 Questions
Exam 12: Protection Mechanisms61 Questions
Select questions type
The process of identifying risk,assessing its relative magnitude,and taking steps to reduce it to an acceptable level.
Free
(Multiple Choice)
4.9/5
(31)
Correct Answer:
A
Classification categories must be mutually exclusive and which of the following?
Free
(Multiple Choice)
4.8/5
(44)
Correct Answer:
C
Once an information asset is identified,categorized,and classified,what must also be assigned to it?
Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
B
As part of the risk identification process,listing the assets in order of importance can be achieved by using a weighted ____________________ worksheet.
(Short Answer)
4.8/5
(34)
Which of the following is a network device attribute that may be used in conjunction with DHCP,making asset-identification using this attribute difficult?
(Multiple Choice)
4.8/5
(36)
Which of the following is an example of a technological obsolescence threat?
(Multiple Choice)
4.7/5
(37)
Having an established risk management program means that an organization's assets are completely protected.
(True/False)
4.8/5
(41)
Briefly describe any three standard categories of information asset and their respective risk management components.
(Essay)
4.8/5
(37)
MAC addresses are considered a reliable identifier for devices with network interfaces,since they are essentially foolproof.
(True/False)
4.7/5
(37)
The identification and assessment of levels of risk in an organization describes which of the following?
(Multiple Choice)
4.8/5
(30)
Two of the activities involved in risk management include identifying risks and assessing risks.Which of the following activities is part of the risk identification process?
(Multiple Choice)
4.9/5
(30)
The secretarial community often takes on the leadership role in addressing risk.
(True/False)
4.9/5
(29)
What strategic role do the InfoSec and IT communities play in risk management? Explain.
(Essay)
4.9/5
(30)
Some threats can manifest in multiple ways,yielding multiple exploits for an asset-threat pair.
(True/False)
4.7/5
(32)
What is defined as specific avenues that threat agents can exploit to attack an information asset?
(Multiple Choice)
4.9/5
(32)
Data classification schemes should categorize information assets based on which of the following?
(Multiple Choice)
4.9/5
(39)
Which of the following distinctly identifies an asset and can be vital in later analysis of threats directed to specific models of certain devices or software components?
(Multiple Choice)
4.8/5
(36)
Occurs when a manufacturer performs an upgrade to a hardware component at the customer's premises.
(Multiple Choice)
4.9/5
(38)
Showing 1 - 20 of 60
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)