Exam 7: Risk Management: Controlling Risk

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Application of training and education is a common method of which risk control strategy? 

(Multiple Choice)
4.8/5
(35)

By multiplying the asset value by the exposure factor,you can calculate which of the following? 

(Multiple Choice)
4.8/5
(36)

Explain two practical guidelines to follow in risk control strategy selection.

(Essay)
4.8/5
(41)

The Microsoft Risk Management Approach includes four phases.Which of the following is NOT one of them? 

(Multiple Choice)
4.8/5
(36)

What are the four stages of a basic FAIR analysis?

(Essay)
4.8/5
(33)

When a vulnerability (flaw or weakness)exists in an important asset,implement security controls to reduce the likelihood of a vulnerability being ___________.

(Short Answer)
4.9/5
(39)

The calculated value associated with the most likely loss from a single attack.

(Multiple Choice)
4.9/5
(42)

​The risk control strategy that attempts to shift risk to other assets,other processes,or other organizations is known as the defense risk control strategy.

(True/False)
4.8/5
(38)

In a cost-benefit analysis,the expected frequency of an attack,expressed on a per-year basis is known as ​the annualized risk of occurrence.

(True/False)
4.8/5
(34)

Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach? 

(Multiple Choice)
4.8/5
(37)

What is the OCTAVE method approach to risk management?

(Essay)
4.8/5
(41)

The ISO 27005 Standard for InfoSec Risk Management includes a five-stage management methodology; among them are risk treatment and risk communication.

(True/False)
4.9/5
(31)

Which of the following describes the financial savings from using the defense risk control strategy to implement a control and eliminate the financial ramifications of an incident? 

(Multiple Choice)
4.8/5
(32)

The criterion most commonly used when evaluating a strategy to implement InfoSec controls and safeguards is economic feasibility.

(True/False)
4.9/5
(37)

Which of the following is NOT an alternative to using CBA to justify risk controls? 

(Multiple Choice)
4.7/5
(26)

The ____________________ risk control strategy attempts to shift the risk to other assets,  processes,or organizations.

(Short Answer)
5.0/5
(37)

The NIST risk management approach includes all but which of the following elements? 

(Multiple Choice)
4.7/5
(31)

Which of the following determines acceptable practices based on consensus and relationships among the communities of interest.

(Multiple Choice)
4.9/5
(32)

The defense risk control strategy may be accomplished by outsourcing to other organizations.

(True/False)
4.9/5
(41)

​The risk control strategy that attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards is the protect risk control strategy,also known as the avoidance strategy.

(True/False)
4.9/5
(32)
Showing 21 - 40 of 60
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)