Ch. 2 Flashcards

1
Q

Your company is establishing new employment candidate screening processes. Which of the following should be included?
A. Check all references
B. Verify all education
C. Review military records and experience
D. Perform a background check

A

A. Check all references
B. Verify all education
D. Perform background check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How is single loss expectancy (SLE) calculated?
A. threat+vulnerability
B. Asset value ($) * exposure factor
C Annualized rate of occurrence * vulnerability
D. Annualized rate of occurrence * asset value * exposure factor

A

B. Asset value ($) * exposure factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
When a safeguard or a countermeasure is not present or is not sufficient, what remains?
A. Vulnerability
B. Exposure
C. Risk
D. Penentration
A

A. Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What is another term for technical controls?
A. Logical controls
B. Access controls
C. Detective controls
D. Preventative Controls
A

A. Logical controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of quantitative risk analysis?
A. To generate an action plan in response to each identified risk
B. To generate a prioritized list of risks that might adversely affect the project
C. To determine the overall impact that specific risks pose to successful project completion
D. To analyze the already prioritized risks in such a way as to give each a numerable rating

A

D. To analyze the already prioritized risks in such a way as to give each a numerable rating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

During business continuity planning, you need to obtain the single loss expectancy (SLE) of the company’s file server. Which formula should you use to determine that?
A. Asset value x exposure factor (EF)
B. Asset value x annualized rate of occurrence (ARO)
C. Exposure factor (EF) x annualized rate of occurrence (ARO)
D. Annualized loss expectancy (ALE) x annualized rate of occurrence (ARO)

A

A. Asset Value x exposure factor (EF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
You are attempting to predict the likelihood a threat will occur, and assigning monetary values in the event a loss occurs. Which technique are you using?
A. Delphi technique
B. Vulnerability assessment
C. Quantitative Risk Analysis
D. Qualitative Risk Analysis
A

C. Quantitative Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
When configuring a new network, you decide to use routers and encryption to improve security. Of which type of technical control is this an example?
A. Recovery
B. Detective
C. Deterrent
D. Directive
E. Corrective
F. Preventative
A

F. Preventative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Management is concerned that you cannot implement some access controls because they are to expensive to implement. you have been asked to provide less expensive alternatives to the expensive access controls. Which type of access control will you be providing?
A. Detective
B. Deterrent
C. Recovery
D. Corrective
E. Directive
F. Preventative
G. Compensative
A

G. Compensative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is not an element of the risk analysis process?
A. Analyzing an environment for risks
B. Creating a cost/benefit report for safeguards to present to upper management
C. Selecting appropriate safeguards and implementing them
D. Evaluating each threat event as to its likelihood of occuring and cost of the resulting damage.

A

C. Selecting appropriate safeguards and implementing them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly