Exam 14: Risk Mitigation

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Matching -​A network that does not have servers, so each device simultaneously functions as both a client and a server to all other devices connected to the network.

(Multiple Choice)
4.8/5
(31)

What kind of policy outlines how organizations use personal information it collects?

(Multiple Choice)
4.8/5
(35)

What are values that are attributed to a system of beliefs that help the individual distinguish right from wrong called?

(Multiple Choice)
4.9/5
(36)

The objective of incident management is to restore normal operations as quickly as possible with the least possible impact on either the business or the users.

(True/False)
4.7/5
(38)

List one reason why social networking sites are popular with attackers.

(Essay)
4.8/5
(31)

List two characteristics of a policy.

(Essay)
4.8/5
(26)

A person's fundamental beliefs and principals, which are used to define what is good, and how to distinguish right from wrong, are collectively called a person's:

(Multiple Choice)
4.8/5
(46)

A(n) ____________________ is a methodical examination and review that produces a detailed report of its findings.

(Short Answer)
5.0/5
(40)

When designing a security policy, many organizations follow a standard set of ____________________.

(Short Answer)
4.8/5
(40)

Matching -A security policy that outlines how the organization uses personal information it collects.​

(Multiple Choice)
4.8/5
(34)

Most people are taught using a(n) ____________________ approach. ​Matching

(Short Answer)
4.9/5
(30)

What can be defined as the study of what a group of people understand to be good and right behavior and how people make those judgments?

(Multiple Choice)
4.8/5
(39)

A(n) ____________________ is a collection of requirements specific to the system or procedure that must be met by everyone.

(Short Answer)
4.8/5
(32)

Matching -​An event that does not appear to be a risk but actually turns out to be one.

(Multiple Choice)
4.9/5
(35)

What are the duties of the CMT?

(Essay)
4.9/5
(32)

A due process policy is a policy that defines the actions users may perform while accessing systems and networking equipment.

(True/False)
4.7/5
(33)

List and describe two of the seven risk categories.

(Essay)
4.9/5
(33)

Matching -​The expected monetary loss every time a risk occurs.

(Multiple Choice)
4.8/5
(43)

The first phase of the security policy cycle involves a vulnerability assessment.

(True/False)
4.7/5
(29)

Websites that group individuals and organizations into clusters or groups based on some sort of affiliation are considered to be what type of websites?

(Multiple Choice)
4.7/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)