Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.Which term below defines the identification and assessment of levels of risk w

ID: 3560575 • Letter: 1

Question

1.Which term below defines the identification and assessment of levels of risk within an organization? A) Risk assessment B) Risk management C) Risk analysis D) Risk identification

2. A(n) ___________ is often a self-employed or agent contractor, hired to perform a specific task or work on a specific project.

3. The ___________ uses categories instead of specific values to determine risk.

4. A ___________ lists activities on a vertical axis, with the horizontal axis representing a time line.

5. The ___________ can be calculated using the values from an ARO multiplied by the values from an SLE.

6. In security management, which term describes a comprehensive assessment of both technical and nontechnical protection strategies for a particular system? A) Accreditation B) Certification C) Authorization D) Verification

7. In the likelihood and consequences rating from the Australian and New Zealand Risk Management Standard 4360, a risk level of 5 indicates what level of consequences? A) Major B) Moderate C) Catastrophic D) Insignificant

8. The ___________ of a threat is the overall rating, or numerical value, of the probability that a specific vulnerability will be exploited.

9. True or False: It is the CISOs responsibility to ensure that InfoSec functions are performed within an organization. A) True B) False

10. After plaintext messages have been encrypted, the encrypted text is known as .

11. An organization is considered to be medium-sized when it has approximately how many devices? A) Less than 100 B) More than 1000 C) More than 2000 D) More than 100, less than 1000

12. True or False: The Critical Path Method is fundamentally different from the PERT diagram. A) True B) False

13. The ________ is used to declare the intended areas of operation for a business.

14. True or False: Asset valuation is the process of assigning financial value or worth to each information asset. A) True B) False

15. The __________ is a set of recommended or best practices for organizations using payment cards.

16. 23. Wireshark is an example of what type of utility? A) Packet sniffer B) Port scanner C) Vulnerability scanner D) Content filter

17. Which two steps within the Risk Management Framework replaced the C&A approach? A) Steps 2 (select) & 3 (implement) B) Steps 3 (implement) & 4 (assess) C) Steps 1 (categorize) & 2 (select) D) Steps 4 (assess) & 5 (authorize)

18. The ____________ , consists of a list of major tasks and attributes, as well as smaller tasks or specific action steps under each major task.

19. Which of the following is described as processes that ensure all actions on a system can be attributed to an authenticated identity? A) Accountability B) Identification C) Authorization D) Authentication

20. The _____________ is the responsibility of the CISO, and is designed to reduce incidence of accidental security breaches by organization members.

21. __________ use a challenge response mechanism in which a server challenges a user with a number, which a user must then enter into a device to calculate the response number.

22. True or False: The CISSP certification is intended for security professionals that may not have much experience in InfoSec. A) True B) False

23. What is the formula for calculating risk? A) (value * uncertainty) + likelihood - risk mitigated = risk B) (value * risk mitigated) + likelihood - uncertainty = risk C) (value * likelihood) - risk mitigated + uncertainty = risk D) (likelihood * uncertainty) + risk mitigated - value = risk

24. 22. What is the range for well-known ports in the TCP/IP protocol suite? A) 1024 through 65,535 B) 0 through 1023 C) 49,152 through 65,535 D) 1024 through 49,151

25. Operational feasibility, which refers to user acceptance and support, as well as management acceptance and support, is also known as __________

Explanation / Answer

answer 1)B) Risk management

answer 2)project manager

answer 3)A)Risk assessment

answer 4)C) Risk analysis

answer 5) A) Risk assessment

answer 6) C) Authorization

answer 7)A) Major

answer 8)B) Moderate

answer 9)A) True

answer 10) information

answer 11)D) More than 100, less than 1000

answer 12)A) True

answer 13)B) Certification

answer 14)A) True

answer 15)

answer 16)B) Port scanner

answer 17)C) Steps 1 (categorize) & 2 (select)

answer 18)authorization

answer 19)D) Authentication

answer 20)C) Authorization

answer 21)B) Identification

answer 22)B) False

answer 23)(value * uncertainty) + likelihood - risk mitigated = risk

answer 24)B) 0 through 1023

answer 25)D) Authentication

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote