Exam 14: IT Security Management and Risk Assessment

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ________ has revised and consolidated a number of national and international standards into a consensus of best practice.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

A

IT security management has evolved considerably over the last fewdecades due to the rise in risks to networked systems.

Free
(True/False)
4.8/5
(26)
Correct Answer:
Verified

True

_________ is sharing responsibility for the risk with a third party.

Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Verified

Risk transfer

Maintaining and improving the information security risk management processin response to incidents is part of the _________ step.

(Multiple Choice)
4.9/5
(31)

The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.

(Short Answer)
4.8/5
(37)

Once the IT management process is in place and working the processnever needs to be repeated.

(True/False)
4.8/5
(34)

IT security management consists of first determining a clear view of anorganization's IT security objectives and general risk profile.

(True/False)
4.7/5
(37)

The _________ provides the most accurate evaluation of an organization's IT system's security risks.

(Short Answer)
4.7/5
(47)

Organizational security objectives identify what IT security outcomesshould be achieved.

(True/False)
4.7/5
(42)

The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.

(Short Answer)
4.8/5
(30)

IT security management functions include:

(Multiple Choice)
4.8/5
(37)

A major advantage of the informal approach is that the individualsperforming the analysis require no additional skills.

(True/False)
4.8/5
(38)

The level of risk the organization views as acceptable is the organization's __________.

(Short Answer)
4.9/5
(39)

Detecting and reacting to incidents is not a function of IT securitymanagement.

(True/False)
4.9/5
(35)

The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.

(Multiple Choice)
4.9/5
(40)

The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.

(Short Answer)
4.8/5
(41)

Organizational security policies identify what needs to be done.

(True/False)
4.9/5
(32)

A major disadvantage of the baseline risk assessment approach is thesignificant cost in time, resources, and expertise needed to performthe analysis.

(True/False)
4.9/5
(36)

One asset may have multiple threats and a single threat may targetmultiple assets.

(True/False)
4.7/5
(41)

The results of the risk analysis should be documented in a _________.

(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)