Filters
Question type

Study Flashcards

A benchmark is derived by comparing measured actual performance against established standards for the measured category.____________ ​

A) True
B) False

Correct Answer

verifed

verified

The ISO 27005 Standard for Information Security Risk Management includes five stages including all but which of the following?


A) risk assessment
B) risk treatment
C) risk communication
D) risk determination

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The risk control strategy that seeks to reduce the impact of a successful attack through the use of IR,DR and BC plans is ____________________ .

Correct Answer

verifed

verified

What is the result of subtracting the post-control annualized loss expectancy and the ACS from the pre-control annualized loss expectancy?


A) cost-benefit analysis
B) exposure factor
C) single loss expectancy
D) annualized rate of occurrence

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

To keep up with the competition organizations must design and create a ____________ environment in which business processes and procedures can function and evolve effectively.

Correct Answer

verifed

verified

An examination of how well a particular solution is supportable given the organization's current technological infrastructure and resources,which include hardware,software,networking,and personnel is known as operational feasibility.____________

A) True
B) False

Correct Answer

verifed

verified

A risk control strategy that eliminates all risk associatedwith an information asset by removing it from service.


A) defense risk control strategy
B) mitigation risk control strategy
C) acceptance risk control strategy
D) termination risk control strategy
E) risk appetite
F) cost-benefit analysis
G) cost avoidance
H) asset valuation
I) organizational feasibility
J) single loss expectancy

K) A) and B)
L) C) and H)

Correct Answer

verifed

verified

Which of the following is NOT a valid rule of thumb on risk control strategy selection?


A) When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.
B) When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.
C) When the attacker's potential gain is less than the costs of attack: Apply protections to decrease the attacker's cost or reduce the attacker's gain, by using technical or operational controls.
D) When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.

E) All of the above
F) None of the above

Correct Answer

verifed

verified

By multiplying the asset value by the exposure factor,you can calculate which of the following?


A) annualized cost of the safeguard
B) single loss expectancy
C) value to adversaries
D) annualized loss expectancy

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

Describe operational feasibility.

Correct Answer

verifed

verified

Operational feasibility refers to user a...

View Answer

What are the four stages of a basic FAIR analysis?

Correct Answer

verifed

verified

Stage 1-Identify Scenario Comp...

View Answer

An examination of how well a particular solution fits within theorganization's strategic planning objectives and goals.


A) defense risk control strategy
B) mitigation risk control strategy
C) acceptance risk control strategy
D) termination risk control strategy
E) risk appetite
F) cost-benefit analysis
G) cost avoidance
H) asset valuation
I) organizational feasibility
J) single loss expectancy

K) D) and F)
L) C) and J)

Correct Answer

verifed

verified

Which of the following determines acceptable practices based on consensus and relationships among the communities of interest.


A) organizational feasibility
B) political feasibility
C) technical feasibility
D) operational feasibility

E) All of the above
F) None of the above

Correct Answer

verifed

verified

Due care and due diligence occur when an organization adopts a certain minimum level of security-that is,what any prudent organization would do in similar circumstances.____________

A) True
B) False

Correct Answer

verifed

verified

The risk control strategy that eliminates all risk associated with an information asset by removing it from service is known as the ​termination risk control strategy.

A) True
B) False

Correct Answer

verifed

verified

Once an organization has estimated the worth of various assets,what three questions must be asked to calculate the potential loss from the successful exploitation of a vulnerability?

Correct Answer

verifed

verified

What damage could occur,and what financi...

View Answer

Risks can be avoided by countering the threats facing an asset or by eliminating the exposure of an asset.

A) True
B) False

Correct Answer

verifed

verified

Explain two practical guidelines to follow in risk control strategy selection.

Correct Answer

verifed

verified

- When a vulnerability (flaw or weakness...

View Answer

A process of assigning financial value or worth to each information asset.


A) defense risk control strategy
B) mitigation risk control strategy
C) acceptance risk control strategy
D) termination risk control strategy
E) risk appetite
F) cost-benefit analysis
G) cost avoidance
H) asset valuation
I) organizational feasibility
J) single loss expectancy

K) A) and F)
L) G) and J)

Correct Answer

verifed

verified

Briefly describe the five basic strategies to control risk that result from vulnerabilities.

Correct Answer

verifed

verified

​ Defense-Applying controls and safeguar...

View Answer

Showing 41 - 60 of 60

Related Exams

Show Answer