Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Which is not an approach for prioritizing threats? Wait and see Change detection

ID: 3918823 • Letter: W

Question

Which is not an approach for prioritizing threats?

Wait and see

Change detection

Easy fixes first

FAIR

5.00000 points   

QUESTION 2

Which of the following is considered a short coming of FAIR?

FAIR is used to derive and articulate risk

The asset and attacker-centricity of FAIR

FAIR defines risk as a function of loss

FAIR estimates worst-case loss

5.00000 points   

QUESTION 3

Which is a factor to consider when deciding to mitigate or accept risk?

Information being collected and stored

Users of the system

Fitness for purpose

All of the above

5.00000 points   

QUESTION 4

Which is a valid test of a threat mitigation?

Test of the mitigation

Test of the mitigation bypass

B but not A

Both A and B

5.00000 points   

QUESTION 5

Software produced for sale should minimize:

License costs

Database connections

Acceptance of risks

Communication of threat model

5.00000 points   

QUESTION 6

Which is a valid form of monitoring for the emergence of threats?

Change detection

Impact detection

Auto detection

Both A and B

5.00000 points   

QUESTION 7

Which is a valid form of standard mitigation technology?

Platform provided controls

Operational controls

Both A and B

A but not B

5.00000 points   

QUESTION 8

Which is a valid method for using design to eliminate risk?

FAIR

Comparative method

Integrated method

Both B and C

5.00000 points   

QUESTION 9

Adding more code to a system can:

Eliminate the source of security vulnerabilities

Not address the source of security vulnerabilities

Expand the source of security vulnerabilities

A, B and C

5.00000 points   

QUESTION 10

A threat tracking method that features thresholds for threat severity is a:

Threshold proximinator

Bug BI

Both A and B

Bug bar

a.

Wait and see

b.

Change detection

c.

Easy fixes first

d.

FAIR

Explanation / Answer

Answer)

1) a ) Wait and See

2) C) It defined the risk as a function of loss

3) d) All of the above

4) c) B but not A -> It is the process to lessen the risk or attack.

5) c) Accpetance of Risk

6) d) Both A and B , the change detection and impact detection

8) A) FAIR Method

9) D) All of the above.

Do any of the below :

Either eliminate risk, or add more risk, or not address the source

Hit like/ upvote if you find the answer useful. Your response is important to us and is much needed.

Hope this answer helps. Happy to help. :)

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote