Chapter 15 Flashcards
Select the option that best describes an asset:
a) any item that is owned by an enterprise
b) any item that is used by management
c) any item that is used b y all employees
d) any item that has a positive economic value
d) any item that has a positive economic value
Risk avoidance involves identifying the risk and and making the decision to engage in the activity.
(T/F)
False
Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of networks?
a) social media network
b) social engineering network
c) social management network
d) social control network
a) social media network
What describes an agreement between two or more parties and demonstrates a “convergence of will” between the parties so that they can work together?
a) BPA
b) ISA
c) NDA
d) MOU
d) MOU
List and describe three of the six risk categories.
three categories:
1) strategic
2) compliance
3) finanical
What type of learner learns best through hands-on approaches?
a) kinesthetic
b) auditory
c) spatial
d) visual
a) kinesthetic
What is a service contract between a vendor and a client that specifies what services will be provided, the responsibilities of each party, and any guarantees service?
a) SLA
b) ISA
c) MOU
d) BPA
a) SLA
Due to the potential impact of changes that can affect all users in an organization, and considering that security vulnerabilities can arise from uncoordinated changes, what should an organization create to oversee changes?
a) security control team
b) incident response team
c) change management team
d) compliance team
c) change management team
Which term below describes the art of helping an adult learn?
a) deontological
b) pedagogical
c) metagogical
d) andragogical
d) andragogical
A written document that states how an organization plans to protect the company’s information technology assets is a:
a) security procedure
b) standard
c) security policy
d) guideline
c) security policy
Which of the following threats would be classified as the actions of a hactivist?
a. External threat
b. Internal threat
c. Environmental threat
d. Compliance threat
a. External threat
Which of these is NOT a response to risk?
a. Mitigation
b. Transference
c. Resistance
d. Avoidance
c. Resistance
Agnella was asked to create a report that listed the reasons why a contractor should be provided penetration testing authorization. Which of the follow would she NOT list in her report?
a. Legal authorization
b. Indemnification
c. Limit retaliation
d. Access to resources
d. Access to resources
Which of the following risk control types would use video surveillance systems and barricades to limit access to secure sites?
a. Operational
b. Managerial
c. Technical
d. Strategic
c. Technical
Which of the following approaches to risk calculation typically assigns a numeric value (1‒10) or label (High, Medium, or Low) represents a risk?
a. Quantitative risk calculation
b. Qualitative risk calculation
c. Rule-based risk calculation
d. Policy-based risk calculation
a. Quantitative risk calculation
Which of the following is the average amount of time that it will take a device to recover from a failure that is not a terminal failure?
a. MTTF
b. MTTR
c. FIT
d. MTBF
b. MTTR
Which of the following covers the procedures of managing object authorizations?
a. Asset management
b. Task management
c. Privilege management
d. Threat management
c. Privilege management
Which statement does NOT describe a characteristic of a policy?
a. Policies define appropriate user behavior.
b. Policies identify what tools and procedures are needed.
c. Policies communicate a unanimous agreement of judgment.
d. Policies may be helpful if it is necessary to prosecute violators.
b. Policies identify what tools and procedures are needed.
Tomassa is asked to determine the expected monetary loss every time a risk occurs. Which formula will she use?
a. AV
b. ARO
c. ALE
d. SLE
d. SLE
What is a collection of suggestions that should be implemented?
a. Policy
b. Guideline
c. Standard
d. Code
b. Guideline
Simona needs to research a control that attempts to discourage security violations before they occur. Which control will she research?
a. Deterrent control
b. Preventive control
c. Detective control
d. Corrective control
a. Deterrent control
Which statement is NOT something that a security policy must do?
a. State reasons why the policy is necessary.
b. Balance protection with productivity.
c. Be capable of being implemented and enforced.
d. Be concise and easy to understand.
b. Balance protection with productivity.
What describes is the ability of an enterprise data center to revert to its former size after expanding?
a. Scalability
b. Elasticity
c. Contraction
d. Reduction
b. Elasticity
Which policy defines the actions users may perform while accessing systems and networking equipment?
a. End-user policy
b. Acceptable use policy
c. Internet use policy
d. User permission policy
b. Acceptable use policy