Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1.Which one of the following would NOT be a possible source of risk data? Past a

ID: 3838976 • Letter: 1

Question

1.Which one of the following would NOT be a possible source of risk data?

Past and Active Audit Findings

Past Security Incidents

Spending and Project Lists

List of Executive Management's Full Names

2.Which one of the following is NOT a type of risk assessment?

Access Recertification

Vulnerability Management

Project-Based

Environment-Based

Internal Compliance to Standards

3.

Which one of the following are NOT factors in the Likilihood rating?

Duration of Disruption

Motivation

Capability

Strength of Controls

Size of Threat-Source

4.

Which one of the following is NOT one of the recognized risk decisions?

Ignore Risk

Accept Risk

Remediate the Risk

Mitigate the Risk

5.

Put the steps of the Risk Assessment process in the correct order (1 being the first step and 5 being the last step).

-

Develop Protection Strategy and Mitigation Plans


      -   

Create Threat Profiles


      -

Identify Organizational Information


      -

Identify and Analyze Risks


      -   

Examine the Computing Infrastructure in Relation to Critical Assets

6. True of False, from an asset profiling and sensitivity perspective, a firewall would not be included because its purposes is only to protect another resource?

True

False

7.

True of False, when writing an assessment report you should use language such as "will" and "must" when describing assessment findings and mitigations plans?

True

False

8.

If you were a Sales Person working for AcmeHealth, which one would you identify as the most important asset from an availability perspective?

Application Production Server

QA Server

Telephone

Development Desktop

Code Repository

Past and Active Audit Findings

Past Security Incidents

Spending and Project Lists

List of Executive Management's Full Names

Explanation / Answer

1..Past Security Incidents

2..Vulnerability Management

3..Size of Threat-Source

4..Remediate the Risk

6..True

7..False

8..Development Desktop

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at drjack9650@gmail.com
Chat Now And Get Quote