Exam Questions and Answers 100%
PASS
Risk - CORRECT ANSWER-The chance a threat will exploit a vulnerability to
cause harm. Threat × Vulnerability × Asset
Threat - CORRECT ANSWER-Anything that could cause harm to an asset
Vulnerability - CORRECT ANSWER-A weakness that can be exploited by a threat
Asset - CORRECT ANSWER-Anything valuable to the organization (hardware,
software, data, etc.)
Impact of Loss - CORRECT ANSWER-The damage caused when a risk is realized
C-I-A Triad - CORRECT ANSWER-Confidentiality (keep data secret), Integrity
(keep data accurate), Availability (keep data accessible).
Residual Risk - CORRECT ANSWER-What remains after risk controls are
applied.
Risk Handling Strategies - CORRECT ANSWER-Avoid, Transfer (e.g., insurance),
Mitigate (reduce), Accept.
, Cost-Benefit Analysis (CBA) - CORRECT ANSWER-Compare cost of control vs.
potential loss.
Threat Likelihood/Impact Matrix - CORRECT ANSWER-Used to prioritize risks.
Reasonableness Test - CORRECT ANSWER-Helps decide if a risk is worth
managing.
People/Process/Technology Risks - CORRECT ANSWER-Risks can come from
users, poor procedures, or flawed tech.
Exploit - CORRECT ANSWER-A method or tool used to take advantage of a
vulnerability
Threat/Vulnerability Pair - CORRECT ANSWER-When a threat and a matching
vulnerability combine to pose risk.
Unintentional Threats - CORRECT ANSWER-Accidental data loss, mistakes, or
neglect.
Intentional Threats - CORRECT ANSWER-Hacking, malware, social engineering.
External Threats - CORRECT ANSWER-Come from outside (e.g., hackers).
Internal Threats - CORRECT ANSWER-Come from within (e.g., employees).
Mitigation Techniques - CORRECT ANSWER-Firewalls, encryption, strong
passwords, training.
COPYRIGHT ©️ 2025 ALL RIGHTS RESERVED