Exam 14: It Security Management and Risk Assessment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The term ________ refers to a document that details not only the overall security objectives and strategies,but also procedural policies that define acceptable behavior,expected practices,and responsibilities.

Free
(Short Answer)
4.9/5
(33)
Correct Answer:
Verified

security policy

The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.

Free
(Short Answer)
4.9/5
(37)
Correct Answer:
Verified

detailed

Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

A

IT security needs to be a key part of an organization's overall management plan.

(True/False)
4.8/5
(40)

IT security management has evolved considerably over the last few decades due to the rise in risks to networked systems.

(True/False)
4.7/5
(32)

It is not critical that an organization's IT security policy have full approval or buy-in by senior management.

(True/False)
4.7/5
(37)

The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.

(Short Answer)
5.0/5
(38)

IT security management consists of first determining a clear view of an organization's IT security objectives and general risk profile.

(True/False)
4.9/5
(36)

Establishing security policy,objectives,processes and procedures is part of the ______ step.

(Multiple Choice)
4.8/5
(34)

_________ is a process used to achieve and maintain appropriate levels of confidentiality,integrity,availability,accountability,authenticity,and reliability.

(Short Answer)
4.9/5
(36)

The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.

(Multiple Choice)
4.8/5
(40)

The level of risk the organization views as acceptable is the organization's __________.

(Short Answer)
4.9/5
(35)

The _________ approach combines elements of the baseline,informal,and detailed risk analysis approaches.

(Short Answer)
4.9/5
(31)

A major disadvantage of the baseline risk assessment approach is the significant cost in time,resources,and expertise needed to perform the analysis.

(True/False)
4.8/5
(32)

ISO details a model process for managing information security that comprises the following steps: plan,do,________,and act.

(Short Answer)
4.9/5
(33)

A(n)_________ is anything that has value to the organization.

(Short Answer)
4.8/5
(33)

Legal and regulatory constraints may require specific approaches to risk assessment.

(True/False)
4.8/5
(29)

A major advantage of the informal approach is that the individuals performing the analysis require no additional skills.

(True/False)
4.9/5
(41)

The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents,codes of practice,and industry best practice.

(Short Answer)
4.9/5
(42)

One asset may have multiple threats and a single threat may target multiple assets.

(True/False)
4.7/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)