1) 4. What is the first step in performing risk management? 2) What practice hel
ID: 3908113 • Letter: 1
Question
1) 4. What is the first step in performing risk management? 2) What practice helps address a risk? 3) What ongoing practice helps track risk in real time? 4) In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor? 5) What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability? 6) For risk monitoring, what techniques or tools can you implement within each of the seven domains of a typical IT infrastructure to help mitigate risk? 7) For risk mitigation, what processes and procedures can help streamline and implement risk- mitigation solutions to the production IT infrastructure?
Explanation / Answer
(1) What is the first step in performing risk management
Ans:The first step in performing risk management to identify the risk. In it uncover, recognize and describe risks that might affect project or its outcomes. There are a number of techniques can use to find project risks. During this step start to prepare Project Risk Register.
(2)What practice helps address a risk?
ANS:Risk Management.
(3)What ongoing practice helps track risk in real time?
Ans: Monitoring
(4)In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor?
Ans: LAN-WAN
(5)What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?
ANS:Unauthorized access from public Internet
User destroys data in application and deletes all files
Hacker penetrates your IT infrastructure and gains access to your internal network
(6)For risk monitoring, what techniques or tools can you implement within each of the seven domains of a typical IT infrastructure to help mitigate risk?
ANS: IDS/IPS Program
Firewalls
Antivirus
User Authentication
Data Backups
(7)For risk mitigation, what processes and procedures are needed to help streamline and implement risk mitigation solutions to the production IT infrastructure?
ANS:Setting up Procedures and Schedules which should help streamline the process and provide the team with a timeline or milestones to ensure timely completion. This can be done using milestones or gannett charts.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.