Exam 14: IT Security Management and Risk Assessment
Exam 1: Computer Systems Overview45 Questions
Exam 2: Cryptographic Tools45 Questions
Exam 3: User Authentication45 Questions
Exam 4: Access Control45 Questions
Exam 5: Database and Cloud Security45 Questions
Exam 6: Malicious Software45 Questions
Exam 7: Denial-Of-Service Attacks45 Questions
Exam 8: Intrusion Detection45 Questions
Exam 9: Firewalls and Intrusion Prevention Systems45 Questions
Exam 10: Buffer Overflow45 Questions
Exam 11: Software Security45 Questions
Exam 12: Operating System Security45 Questions
Exam 13: Cloud and Iot Security45 Questions
Exam 14: IT Security Management and Risk Assessment45 Questions
Exam 15: IT Security Controls, Plans, and Procedures45 Questions
Exam 16: Physical and Infrastructure Security45 Questions
Exam 17: Human Resources Security45 Questions
Exam 18: Security Auditing45 Questions
Exam 19: Legal and Ethical Aspects45 Questions
Exam 20: Symmetric Encryption and Message Confidentiality45 Questions
Exam 21: Public-Key Cryptography and Message Authentication45 Questions
Exam 22: Internet Security Protocols and Standards45 Questions
Exam 23: Internet Authentication Applications45 Questions
Exam 24: Wireless Network Security45 Questions
Select questions type
The ________ has revised and consolidated a number of national and international standards into a consensus of best practice.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
A
IT security management has evolved considerably over the last fewdecades due to the rise in risks to networked systems.
Free
(True/False)
4.8/5
(26)
Correct Answer:
True
_________ is sharing responsibility for the risk with a third party.
Free
(Short Answer)
4.8/5
(31)
Correct Answer:
Risk transfer
Maintaining and improving the information security risk management processin response to incidents is part of the _________ step.
(Multiple Choice)
4.9/5
(31)
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.
(Short Answer)
4.8/5
(37)
Once the IT management process is in place and working the processnever needs to be repeated.
(True/False)
4.8/5
(34)
IT security management consists of first determining a clear view of anorganization's IT security objectives and general risk profile.
(True/False)
4.7/5
(37)
The _________ provides the most accurate evaluation of an organization's IT system's security risks.
(Short Answer)
4.7/5
(47)
Organizational security objectives identify what IT security outcomesshould be achieved.
(True/False)
4.7/5
(42)
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.
(Short Answer)
4.8/5
(30)
A major advantage of the informal approach is that the individualsperforming the analysis require no additional skills.
(True/False)
4.8/5
(38)
The level of risk the organization views as acceptable is the organization's __________.
(Short Answer)
4.9/5
(39)
Detecting and reacting to incidents is not a function of IT securitymanagement.
(True/False)
4.9/5
(35)
The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.
(Multiple Choice)
4.9/5
(40)
The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.
(Short Answer)
4.8/5
(41)
Organizational security policies identify what needs to be done.
(True/False)
4.9/5
(32)
A major disadvantage of the baseline risk assessment approach is thesignificant cost in time, resources, and expertise needed to performthe analysis.
(True/False)
4.9/5
(36)
One asset may have multiple threats and a single threat may targetmultiple assets.
(True/False)
4.7/5
(41)
The results of the risk analysis should be documented in a _________.
(Multiple Choice)
4.8/5
(41)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)