Exam 20: Risk Management
Exam 1: Introduction and Security Trends49 Questions
Exam 2: General Security Concepts65 Questions
Exam 3: Operational-Organizational Security43 Questions
Exam 4: The Role of People in Security40 Questions
Exam 5: Cryptography49 Questions
Exam 6: Public Key Infrastructure50 Questions
Exam 7: Standards and Protocols44 Questions
Exam 8: Physical Security45 Questions
Exam 9: Network Fundamentals55 Questions
Exam 10: Infrastructure Security42 Questions
Exam 11: Authentication and Remote Access46 Questions
Exam 12: Wireless43 Questions
Exam 13: Intrusion Detection Systems and Network Security49 Questions
Exam 14: Baselines45 Questions
Exam 15: Types of Attacks and Malicious Software50 Questions
Exam 16: E-Mail and Instant Messaging47 Questions
Exam 17: Web Components45 Questions
Exam 18: Secure Software Development40 Questions
Exam 19: Disaster Recovery, Business Continuity, and Organizational Policies53 Questions
Exam 20: Risk Management42 Questions
Exam 21: Change Management35 Questions
Exam 22: Privilege Management39 Questions
Exam 23: Computer Forensics40 Questions
Exam 24: Legal Issues and Ethics40 Questions
Exam 25: Privacy40 Questions
Select questions type
Which of the following describes the process of asset identification during a risk assessment?
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
B
_______________ are histograms that rank the categories in a chart from most frequent to least frequent,thus facilitating risk prioritization.
Free
(Short Answer)
4.7/5
(37)
Correct Answer:
Gantt charts
It is recognized throughout the industry that the best type of risk assessment to conduct is a purely quantitative one.
Free
(True/False)
4.9/5
(32)
Correct Answer:
False
Which of the following is used to calculate the threshold for evaluating the cost/benefit ratio of a given countermeasure?
(Multiple Choice)
5.0/5
(43)
Which of the following is the formula for single loss expectancy (SLE)?
(Multiple Choice)
4.8/5
(37)
A risk management plan is a comprehensive document that explains how risks will be identified on a given project.
(True/False)
4.7/5
(23)
Cause and effect analysis is the process of identifying relationships between a risk and the organization's needs.
(True/False)
4.7/5
(37)
An organization can reduce its risks to zero through careful planning and implementation.
(True/False)
4.9/5
(45)
What are the steps for the software engineering institute model for risk management?
(Multiple Choice)
4.8/5
(30)
_______________ is the overall decision-making process of identifying threats and vulnerabilities and their potential impacts,determining the costs to mitigate such events,and deciding what actions are cost effective for controlling these risks.
(Short Answer)
4.9/5
(33)
Using the general risk management model,direct loss of money,interruption of business activity,and breach of confidence,fall under which step?
(Multiple Choice)
4.8/5
(44)
Which management tool is used for diagramming the interdependencies between project activities,showing the sequence and duration of each activity?
(Multiple Choice)
4.8/5
(29)
Performing a cost/benefit analysis to determine the effectiveness of a countermeasure is not a useful way to evaluate a countermeasure,because risk needs to be reduced at any cost.
(True/False)
4.9/5
(32)
_______________ is a measure of the magnitude of loss of an asset,and is used in the calculation of a single loss expectancy.
(Short Answer)
4.8/5
(38)
A(n)_______________ is any characteristic of an asset that can be exploited by a threat to cause harm.
(Short Answer)
4.9/5
(41)
A(n)_______________ is a measure taken to detect,prevent,or mitigate the risk associated with a threat.
(Short Answer)
4.8/5
(45)
A risk that remains after implementing controls is termed a(n)_______________.
(Short Answer)
4.7/5
(29)
Which management tool is used for identifying relationships between a risk and the factors that can cause it?
(Multiple Choice)
4.9/5
(30)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)