A. Threat coupled with a breach
B. Threat coupled with a vulnerability
C. Vulnerability coupled with an attack
D. Threat coupled with a breach of security
B
A. Determine the physical storage costs and multiply by the expected life of the company
B. With the assistance of a finance accounting professional determine how much profit the asset has returned
C. Review the depreciation of the intangible asset over the past three years
D. Use the historical acquisition or development cost of the intangible asset
B
A. Ease of implementation and it can be completed by personnel with a limited understanding of the risk assessment process
B. Can be completed by personnel with a limited understanding of the risk assessment process and uses detailed metrics used for calculation of risk
C. Detailed metrics used for calculation of risk and ease of implementation
D. Can be completed by personnel with a limited understanding of the risk assessment process and detailed metrics used for the calculation of risk.
A
A. Asset value and annualized rate of occurrence (ARO)B. Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
C. Asset value and exposure factor
D. Local annual frequency estimate and annualized rate of occurrence
C*The formula for calculating SLE is SLE = asset value (in $) X exposure factor (loss in successful threat exploit, as %).
A. Culture of the organization, likelihood of exposure and budget
B. Budget, capabilities of resources and likelihood of exposure
C. Capabilities of resources, likelihood of exposure and budget
D. Culture of the organization, budget, capabilities and resources
D
A. Legislated security compliance objectives
B. Security roles and responsibilities for staff
C. The high-level outcome of vulnerability assessments
D. Specialized curriculum assignments, coursework and an accredited institution
B
A. Due diligence
B. Risk mitigation
C. Asset protection
D. Due care
D
A. Achieves security at the lowest cost
B. Reduces risk to an acceptable level
C. Prioritizes security for new products
D. Installs patches in a timely manner
B
A. Denial of services, fires, floods, hurricanes, and unauthorized transactions
B. Fires, floods, hurricanes, unauthorized transactions and unreadable backup tapes
C. Unauthorized transactions, fires, floods, hurricanes and unreadable backup tapes
D. Denial of services, fires floods, and hurricanes and unreadable backup tapes.
D
A. A set of plans for preventing a disaster.
B. An approved set of preparations and sufficient procedures for responding to a disaster.
C. A set of preparations and procedures for responding to a disaster without management approval.
D. The adequate preparations and procedures for the continuation of all organization functions.
D
A. Identify all business units within an organization
B. Evaluate the impact of disruptive events
C. Estimate the Recovery Time Objectives (RTO)
D. Evaluate the criticality of business functions
A
A. Establish high-level security policies
B. Enable enterprise/entity-wide security management
C. Reduce downtime
D. Deploy new security technology
D
A. Everyone
B. Senior management
C. Security officer
D. Data owners
C
A. Design
B. Rapid prototyping
C. Testing
D. Implementation
D
A. Mitigate compliance issues
B. Establish an effective control environment
C. Identify control gaps
D. Address information technology for financial statements
C
A. makes a base assumption that a broad risk assessment is the most efficient way to determine risk in a system, business segment, application or process.
B. makes a base assumption that a narrow risk assessment is the most efficient way to determine risk in a system, business segment, application or process.
C. makes a base assumption that a narrow risk assessment is the least efficient way to determine risk in a system, business segment, application or process.
D. makes a base assumption that a broad risk assessment is the least efficient way to determine risk in a system, business segment, application or process.
B
A. Establishes personal accountability, reduces cross-training requirements and reduces departmental turf battles
B. Enables continuous improvement, reduces cross-training requirements and reduces departmental turf battles
C. Establishes personal accountability, establishes continuous improvement and reduces turf battles
D. Reduces departmental turf battles, Reduces cross-training requirements and establishes personal accountability
C
A. At least annually or at pre-determined organization changes
B. After major project implementations
C. When applications or operating systems are updated
D. When procedures need to be modified
A
A. Threats to its assets, vulnerabilities not present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on the organization, the residual risk
B. Threats to its assets, vulnerabilities present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on another organization, the residual risk
C. Threats to its assets, vulnerabilities present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on the organization, the residual risk
D. threats to its assets, vulnerabilities present in the environment, the likelihood that a threat will be realized by taking advantage of an exposure, the impact that the exposure being realized will have on the organization, the total risk
C
A. Directive words such as shall, must, or will, technical specifications and is short in length
B. Defined policy development process, short in length and contains directive words such as shall, must or will
C. Short in length, technical specifications and contains directive words such as shall, must or will
D. Directive words such as shall, must, or will, defined policy development process and is short in length
D
A. A well-formed transaction
B. Separation of duties
C. Least privilege
D. Data sensitivity level
B
A. Job rotation
B. Data classification
C. Defining job sensitivity level
D. Least privilege
A
A. User managers
B. Data owners
C. Senior management
D. Application developer
B
A. Continuity planning is a significant organizational issue and should include all parts or functions of the company.
B. Continuity planning is a significant technology issue and the recovery of technology should be its primary focus.
C. Continuity planning is required only where there is complexity in voice and data communications.
D. Continuity planning is a significant management issue and should include the primary functions specified by management.
A