Question 1
____ feasibility analysis examines user acceptance and support, management acceptance and support, and the overall requirements of the organization’s stakeholders.Selected Answer:
OperationalCorrect Answer:
OperationalQuestion 2
Once the organizational threats have been identified, an assets identification process is undertaken.Selected Answer:
FalseCorrect Answer:
FalseQuestion 3
The ____ strategy attempts to prevent the exploitation of the vulnerability.Selected Answer:
defend controlCorrect Answer:
defend controlQuestion 4
The amount of money spent to protect an asset is based in part on the value of the asset.Selected Answer:
TrueCorrect Answer:
TrueQuestion 5
Risk ____ is the application of controls to reduce the risks to an organization’s data and information systems.Selected Answer:
managementCorrect Answer:
controlQuestion 6
Comprehensive means that an information asset should fit in only one category.Selected Answer:
FalseCorrect Answer:
FalseQuestion 7
The first phase of risk management is ____.Selected Answer:
risk identificationCorrect Answer:
risk identificationQuestion 8
____ equals likelihood of vulnerability occurrence times value (or impact) minus percentage risk already controlled plus an element of uncertainty.Selected Answer:
RiskCorrect Answer:
RiskQuestion 9
The ____ strategy attempts to shift risk to other assets, other processes, or other organizations.Selected Answer:
transfer controlCorrect Answer:
transfer controlQuestion 10
Risk ____ defines the quantity and nature of risk that organizations are willing to accept as they evaluate the tradeoffs between perfect security and unlimited accessibility.Selected Answer:
appetiteCorrect Answer:
appetiteQuestion 11
Metrics-based measures are generally less focused on numbers and more strategic than process-based measures.Selected Answer:
FalseCorrect Answer:
FalseQuestion 12
When organizations adopt levels of security for a legal defense, they may need to show that they have done what any prudent organization would do in similar circumstances. This is referred to as a(n) ____.Selected Answer:
standard of due careCorrect Answer:
standard of due careQuestion 13
The ____ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.Selected Answer:
accept controlCorrect Answer:
accept controlQuestion 14
If every vulnerability identified in the organization is handled through mitigation, it may reflect an inability to conduct proactive security activities and an apathetic approach to security in general.Selected Answer:
FalseCorrect Answer:
FalseQuestion 15
There are individuals who search trash and recycling — a practice known as ____ — to retrieve information that could embarrass a company or compromise information security.Selected Answer:
dumpster divingCorrect Answer:
dumpster diving
Tuesday, January 14, 2014
CIS 481-20: INTRO TO INFORM SECURITY CH4
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment