Solved

Match Each Item with an Statement Below

Question 19

Matching

Match each item with an statement below:

Premises:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Responses:
Exposure Factor (EF)
Attack tree
Acceptable use policy (AUP)
Annualized Rate of Occurrence (ARO)
Security policy
Code of ethics
Risk assessment
Data
Security policy cycle

Correct Answer:

never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Related Questions