Exam 6: Risk Management: Identifying and Assessing Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Remains even after current control has been applied.

(Multiple Choice)
4.8/5
(44)

An estimate made by the manager using good judgement and experience can account for which factor of risk assessment? 

(Multiple Choice)
4.8/5
(41)

What should the prioritized list of assets and their vulnerabilities and the prioritized list of threats facing the organization be combined to create? 

(Multiple Choice)
4.8/5
(45)

The likelihood of the occurrence of a vulnerability multiplied by the value of the information asset minus the percentage of risk mitigated by current controls plus the uncertainty of current knowledge of the vulnerability are each examples of _____.

(Multiple Choice)
4.8/5
(34)

An evaluation of the threats to information assets,including a determination of their potential to endanger the organization is known as exploit assessment.

(True/False)
4.7/5
(37)

Classification categories must be ____________________ and mutually exclusive.

(Short Answer)
4.9/5
(38)

The recognition,enumeration,and documentation of risks to an organization's information assets.

(Multiple Choice)
4.8/5
(34)

As each information asset is identified,categorized,and classified,a ________ value must also be assigned to it.

(Short Answer)
4.8/5
(32)

​An asset valuation approach that uses categorical or nonnumeric values rather than absolute numerical measures is known as numberless assessment.

(True/False)
4.8/5
(42)

An evaluation of the dangers to information assets,including a determination of their potential to endanger the organization.

(Multiple Choice)
4.8/5
(33)

What should you be armed with to adequately assess potential weaknesses in each information asset? 

(Multiple Choice)
4.8/5
(35)

List the stages in the risk identification process in order of occurrence.

(Essay)
4.8/5
(41)

​The probability that a specific vulnerability within an organization will be the target of an attack is known as risk.

(True/False)
4.8/5
(40)

How should the initial inventory be used when classifying and categorizing assets?

(Essay)
4.7/5
(39)

The quantity and nature of risk that organizations are willing to accept.

(Multiple Choice)
4.9/5
(40)

The Australian and New Zealand Risk Management Standard 4360 uses qualitative methods to determine risk based on a threat's probability of occurrence and expected results of a successful attack.

(True/False)
4.8/5
(40)

Which of the following is an attribute of a network device is physically tied to the network interface? 

(Multiple Choice)
4.9/5
(41)

An approach to combining risk identification,risk assessment,and risk appetite into a single strategy.

(Multiple Choice)
4.8/5
(40)

Determining the cost of recovery from an attack is one calculation that must be made to identify risk,what is another? 

(Multiple Choice)
4.7/5
(37)

An asset valuation approach that uses categorical or nonnumeric values rather than absolute numerical measures.

(Multiple Choice)
4.7/5
(39)
Showing 41 - 60 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)