Exam 14: Risk Mitigation
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
What is the name for a framework and corresponding functions required to enable incident response and incident handling within an organization?
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
B
A collection of suggestions that should be implemented are referred to as a:
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
Contrast the difference between a pedagogical approach versus an andragogical approach to subject matter.
Free
(Essay)
4.8/5
(27)
Correct Answer:
In a pedagogical approach, the subject matter is defined by what the teacher wants to give. In an andragogical approach, learning is organized around situations in life or at work.
Audits serve to verify that the security protections enacted by an organization are being followed and that corrective actions can be swiftly implemented before an attacker exploits a vulnerability.
(True/False)
4.9/5
(30)
A written document that states how an organization plans to protect the company's information technology assets is a:
(Multiple Choice)
4.8/5
(33)
What kind of learners learn from taking notes, being at the front of the class, and watching presentations?
(Multiple Choice)
4.8/5
(42)
Matching
-Risk control type that covers the operational procedures to limit risk
(Multiple Choice)
4.8/5
(33)
Matching
-The "framework" and functions required to enable incident response and incident handling within an organization.
(Multiple Choice)
4.8/5
(41)
Policies that include statements regarding how an employee's information technology resources will be addressed are part of a:
(Multiple Choice)
4.8/5
(23)
Which roles should be represented on the security policy development team?
(Essay)
5.0/5
(37)
Generally considered to be the most important information security policies, what item below defines the actions a user may perform while accessing systems and networking equipment?
(Multiple Choice)
4.8/5
(30)
Which type of network below uses a direct connection between users, and involves each device simultaneously acting as a client and a server?
(Multiple Choice)
4.9/5
(26)
What concept below is at the very heart of information security?
(Multiple Choice)
4.7/5
(32)
Matching
-A policy that defines the actions users may perform while access systems and networking equipment
(Multiple Choice)
4.9/5
(33)
List four attributes that should be compiled for new equipment in the change management documentation.
(Essay)
4.8/5
(36)
Matching
-A methodology for making modifications to a system and keeping track of those changes.
(Multiple Choice)
4.9/5
(41)
____________________ seeks to approach changes systematically and provide the necessary documentation of the changes.
(Short Answer)
4.8/5
(31)
Matching
-An event that in the beginning is considered to be a risk yet turns out to not be one.
(Multiple Choice)
5.0/5
(34)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)