Filters
Question type

Study Flashcards

What are the four phases of the Microsoft risk management strategy?

Correct Answer

verifed

verified

1.Assessing risk
2.Conducting...

View Answer

The risk control strategy that attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards is the protect risk control strategy,also known as the avoidance strategy.____________

A) True
B) False

Correct Answer

verifed

verified

Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?


A) incident response plan
B) business continuity plan
C) disaster recovery plan
D) damage control plan

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

What does the result of a CBA determine?What is the formula for the CBA?

Correct Answer

verifed

verified

The CBA determines whether the benefit f...

View Answer

The NIST risk management approach includes all but which of the following elements?


A) inform
B) assess
C) frame
D) respond

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Which of the following is not a step in the FAIR risk management framework?


A) identify scenario components
B) evaluate loss event frequency
C) assess control impact
D) derive and articulate risk

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is the OCTAVE method approach to risk management?

Correct Answer

verifed

verified

The Operationally Critical Threat,Asset,...

View Answer

Which of the following describes an organization's efforts to reduce damage caused by a realized incident or disaster?


A) acceptance
B) avoidance
C) transference
D) mitigation

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

The financial savings from using the defense risk control strategy to implementa control and eliminate the financial ramifications of an incident.


A) defense risk control strategy
B) mitigation risk control strategy
C) acceptance risk control strategy
D) termination risk control strategy
E) risk appetite
F) cost-benefit analysis
G) cost avoidance
H) asset valuation
I) organizational feasibility
J) single loss expectancy

K) C) and H)
L) A) and E)

Correct Answer

verifed

verified

Which of the following is NOT an alternative to using CBA to justify risk controls?


A) benchmarking
B) due care and due diligence
C) selective risk avoidance
D) the gold standard

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

The goal of InfoSec is not to bring residual risk to zero; rather,it is to bring residual risk in line with an organization's risk ___________.

Correct Answer

verifed

verified

A risk control strategy that attempts to reduce the impactof the loss caused by a realized incident,disaster,or attack through effective contingencyplanning and preparation.


A) defense risk control strategy
B) mitigation risk control strategy
C) acceptance risk control strategy
D) termination risk control strategy
E) risk appetite
F) cost-benefit analysis
G) cost avoidance
H) asset valuation
I) organizational feasibility
J) single loss expectancy

K) G) and H)
L) B) and I)

Correct Answer

verifed

verified

The ____________________ risk control strategy attempts to shift the risk to other assets,processes,or organizations.

Correct Answer

verifed

verified

transferen...

View Answer

A risk control strategy that indicates the organization iswilling to accept the current level of risk and that the organization makes a conscious decisionto do nothing to protect an information asset from risk and to accept the outcome from anyresulting exploitation.


A) defense risk control strategy
B) mitigation risk control strategy
C) acceptance risk control strategy
D) termination risk control strategy
E) risk appetite
F) cost-benefit analysis
G) cost avoidance
H) asset valuation
I) organizational feasibility
J) single loss expectancy

K) G) and H)
L) A) and J)

Correct Answer

verifed

verified

Application of training and education is a common method of which risk control strategy?


A) mitigation
B) defense
C) acceptance
D) transferal

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

When a vulnerability (flaw or weakness)exists in an important asset,implement security controls to reduce the likelihood of a vulnerability being ___________.

Correct Answer

verifed

verified

In which technique does a group rate or rank a set of information,compile the results and repeat until everyone is satisfied with the result?


A) OCTAVE
B) FAIR
C) Hybrid Measures
D) Delphi

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Describe the use of hybrid assessment to create a quantitative assessment of asset value.

Correct Answer

verifed

verified

The hybrid assessment,tries to improve u...

View Answer

The risk control strategy that indicates the organization is willing to accept the current level of risk.As a result,the organization makes a conscious decision to do nothing to protect an information asset from risk and to accept the outcome from any resulting exploitation is known as the termination risk control strategy.

A) True
B) False

Correct Answer

verifed

verified

Which of the following affects the cost of a control?


A) liability insurance
B) CBA report
C) asset resale
D) maintenance

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 21 - 40 of 60

Related Exams

Show Answer