Filters
Question type

Study Flashcards

Communicating new or revised policy to employees is adequate to assure compliance.

A) True
B) False

Correct Answer

verifed

verified

When a vulnerability (flaw or weakness)exists,you should implement security policies to reduce the likelihood of a vulnerability being exercised._________________________

A) True
B) False

Correct Answer

verifed

verified

A cost-benefit analysis is calculated by subtracting the post-control annualized loss expectancy and the ____ from the pre-control loss expectancy


A) annualized cost of the safeguard
B) exposure factor
C) annualized rate of occurrence
D) asset value

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

____________________ is a risk management framework developed to help organizations to understand,analyze,and measure information risk.The outcomes are more cost-effective information risk management,greater credibility for the information security profession,and a foundation from which to develop a scientific approach to information risk management.

Correct Answer

verifed

verified

Factor Ana...

View Answer

Common sense dictates that an organization should spend more to protect an asset than its value.

A) True
B) False

Correct Answer

verifed

verified

Step-by-step rules to regain normalcy is covered by which of the following plans in the mitigation control approach?


A) Incident response plan
B) Business continuity plan
C) Disaster recovery plan
D) Damage control plan

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

The Microsoft Risk Management Approach includes four phases.Which of the following is NOT one of them?


A) Assessing risk
B) Implementing controls
C) Building executive consensus
D) Measuring program effectiveness

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Cost Benefit Analysis is determined by calculating the single loss expectancy before new controls minus the annualized loss expectancy after controls are implemented minus the annualized cost of the safeguard._________________________

A) True
B) False

Correct Answer

verifed

verified

Which of the following is NOT a valid rule of thumb on risk control strategy selection?


A) When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exercised.
B) When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.
C) When the attacker's potential gain is less than the costs of attack: Apply protections to decrease the attacker's cost or negate the attacker's gain, by using technical or operational controls.
D) When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

Due care and due diligence occur when an organization adopts a certain minimum level of security as what any ____________________ organization would do in similar circumstances.

Correct Answer

verifed

verified

A system's exploitable vulnerabilities are usually determined after the system is designed.

A) True
B) False

Correct Answer

verifed

verified

____ feasibility is also referred to as behavioral feasibility.


A) Operational
B) Organizational
C) Political
D) Technical

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Avoidance of risk is the choice to forgo the use of security measures and accept loss in the event of an attack._________________________

A) True
B) False

Correct Answer

verifed

verified

Asset evaluation is the process of assigning financial worth to each information asset._________________________

A) True
B) False

Correct Answer

verifed

verified

Mitigation depends on the ability to detect and respond to an attack as quickly as possible ._________________________

A) True
B) False

Correct Answer

verifed

verified

The only use of the acceptance strategy that industry practices recognize as valid occurs when the organization has done all but which of the following?


A) Determined the level of risk posed to the information asset
B) Performed a thorough cost-benefit analysis
C) Determined that the particular function, service, information, or asset did justify the cost of additional protection
D) Assessed the probability of attack and the likelihood of a successful exploitation of a vulnerability

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

The ____ is the calculation of the value associated with the most likely loss from an attack.


A) SLE
B) ALE
C) CBA
D) ARO

E) None of the above
F) B) and D)

Correct Answer

verifed

verified

The Microsoft Risk Management Approach includes four phases: assessing risk,conducting decision support,implementing controls and measuring program effectiveness._________________________

A) True
B) False

Correct Answer

verifed

verified

____ is the choice to do nothing to protect an information asset from risk and to accept the outcome from any resulting exploitation.


A) Avoidance
B) Acceptance
C) Mitigation
D) Risk tolerance

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

The final choice of a risk control strategy may call for a balanced mixture of controls that provides the greatest value for as many asset-threat pairs as possible.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 105

Related Exams

Show Answer