IS 413 Module 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____ is simply how often you expect a specific type of attack to occur. CBA ALE SLE ARO

Annualized rate of occurence(ARO)

The formal decision-making process used when considering the economic feasibility of implementing information security controls and safeguards is called a(n) _____. ALE CBA SLE ARO

Cost Benefit Analysis (CBA)

A(n) _____ scheme is a formal access control methodology used to assign a level of confidentiality to an information asset and thus restrict the number of people who can access it. risk management data recovery security clearance data classification

Data Classification

The concept of competitive _____ refers to falling behind the competition. disadvantage shortcoming drawback failure

Disadvantage

"Know the enemy" means identifying, examining, and understanding the competition facing the organization. _____ True False

False

According to Sun Tzu, if you know yourself and know your enemy, you have an average chance to be successful in an engagement. True False

False

Identifying human resources, documentation, and data information assets of an organization is easier than identifying hardware and software assets. True False

False

Risk mitigation is the process of assigning a risk rating or score to each information asset. _____ True False

False

Risk perception is the assessment of the amount of risk an organization is willing to accept for a particular information asset, typically part of the risk appetite. _____ True False

False

_____ addresses are sometimes called electronic serial numbers or hardware addresses. IP DHCP HTTP MAC

MAC

Which of the following is NOT one of the categories recommended for categorizing information assets? People Hardware Firmware Procedures

People

Establishing a competitive business model, method, or technique enables an organization to provide a product or service that is superior and creates a(n) competitive advantage. _____ True False

True

If the acceptance risk treatment strategy is used to handle every vulnerability in the organization, its managers may be unable to conduct proactive security activities and may portray an apathetic approach to security in general. True False

True

Likelihood is the probability that a specific vulnerability within an organization will be the target of an attack. _____ True False

True

Risk acceptance defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility. _____ True False

True

Some information security experts argue that it is virtually impossible to determine the true value of information and information-bearing assets. True False

True

The identification, analysis, and evaluation of risk as initial parts of risk management is called risk assessment. _____ True False

True

The mitigation risk treatment strategy applies controls and safeguards that eliminate or reduce the remaining uncontrolled risk. _____ True False

True

When determining the relative importance of each asset, refer to the organization's mission statement or statement of objectives to determine which elements are essential, which are supportive, and which are merely adjuncts. True False

True

In a _____, assets or threats can be prioritized by identifying criteria with differing levels of importance, assigning a score for each of the criteria, and then summing and ranking those scores. threat assessment data classification scheme weighted table analysis risk management program

Weighted table analysis


संबंधित स्टडी सेट्स

Motor Control, LVL 2. Lesson 6: Special Purpose Starters

View Set

Chapter 7: The Solar System Lesson 2: What Is the Solar System?

View Set

Patient Care Chp 18 Aseptic Techniques

View Set

Psych - Ch 10, 11, 12, 13, 14, 15

View Set

CIS 105: Module 5 Software and Apps Exam

View Set

Kill the Indian and Save the Man

View Set

Anatomy and Physiology chapter 12

View Set

International Business Chapter 3 Midterm

View Set

Medical Terminology Chapter 5- Circulation and Heart Structures & Blood Flow Through the Heart

View Set