Which is not an approach for prioritizing threats? Wait and see Change detection
ID: 3918823 • Letter: W
Question
Which is not an approach for prioritizing threats?
Wait and see
Change detection
Easy fixes first
FAIR
5.00000 points
QUESTION 2
Which of the following is considered a short coming of FAIR?
FAIR is used to derive and articulate risk
The asset and attacker-centricity of FAIR
FAIR defines risk as a function of loss
FAIR estimates worst-case loss
5.00000 points
QUESTION 3
Which is a factor to consider when deciding to mitigate or accept risk?
Information being collected and stored
Users of the system
Fitness for purpose
All of the above
5.00000 points
QUESTION 4
Which is a valid test of a threat mitigation?
Test of the mitigation
Test of the mitigation bypass
B but not A
Both A and B
5.00000 points
QUESTION 5
Software produced for sale should minimize:
License costs
Database connections
Acceptance of risks
Communication of threat model
5.00000 points
QUESTION 6
Which is a valid form of monitoring for the emergence of threats?
Change detection
Impact detection
Auto detection
Both A and B
5.00000 points
QUESTION 7
Which is a valid form of standard mitigation technology?
Platform provided controls
Operational controls
Both A and B
A but not B
5.00000 points
QUESTION 8
Which is a valid method for using design to eliminate risk?
FAIR
Comparative method
Integrated method
Both B and C
5.00000 points
QUESTION 9
Adding more code to a system can:
Eliminate the source of security vulnerabilities
Not address the source of security vulnerabilities
Expand the source of security vulnerabilities
A, B and C
5.00000 points
QUESTION 10
A threat tracking method that features thresholds for threat severity is a:
Threshold proximinator
Bug BI
Both A and B
Bug bar
a.Wait and see
b.Change detection
c.Easy fixes first
d.FAIR
Explanation / Answer
Answer)
1) a ) Wait and See
2) C) It defined the risk as a function of loss
3) d) All of the above
4) c) B but not A -> It is the process to lessen the risk or attack.
5) c) Accpetance of Risk
6) d) Both A and B , the change detection and impact detection
8) A) FAIR Method
9) D) All of the above.
Do any of the below :
Either eliminate risk, or add more risk, or not address the source
Hit like/ upvote if you find the answer useful. Your response is important to us and is much needed.
Hope this answer helps. Happy to help. :)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.