0.25 out of 0.25 points
When would someone ask, “Would a reasonable person be expected to
manage this risk?”
Selected when applying a reasonableness
Answer:
test
Answers: when performing a risk assessment
when applying a reasonableness
test
when applying the reasonable
person standard
when performing a cost/benefit
analysis
Question 2
0.25 out of 0.25 points
When a threat exploits a vulnerability, it results in a(n) __________.
Selected loss
Answer:
Answers: impac
t
loss
crime
liabilit
y
Question 3
0.25 out of 0.25 points
As a top-level executive at your own company, you are worried that your
employees may steal confidential data too easily by downloading and
taking home data onto thumb drives. What is the best way to prevent this
from happening?
Selected Create and enforce a written company policy against the use of
Answer:
thumb drives, and install a technical controls on the computers
that will prevent the use of thumb drives.
Answers: Install a technical control to prevent the use of thumb drives.
Instruct higher level employees to inform their employees that
the use of a thumb drive is a fireable offense.
Hold a seminar that explains to employees why the use of thumb
drives in the workplace is a security hazard.
Create and enforce a written company policy against the use of
, thumb drives, and install a technical controls on the computers
that will prevent the use of thumb drives.
Question 4
0.25 out of 0.25 points
Risk __________ is the practice of identifying, assessing, controlling, and
mitigating risks.
Selected managem
Answer:
ent
Answers: assessme
nt
mitigation
managem
ent
evaluatio
n
Question 5
0 out of 0.25 points
What is NOT an example of an intangible value?
Selected cost of gaining a
Answer:
consumer
Answers: future lost revenue
cost of gaining a
consumer
customer influence
data
Question 6
0.25 out of 0.25 points
What is the primary reason to avoid risk?
Selected The impact of the risk outweighs the benefit
Answer:
of the asset.
Answers: Risks create vulnerabilities and threats.
The impact of the risk outweighs the benefit
of the asset.
Risks are easily exploited.
Risks can destroy a business.
Question 7
0 out of 0.25 points
Identify the true statement.
, Selected Vulnerability is a synonym for loss.
Answer:
Answers: Exploited vulnerabilities result in losses.
All vulnerabilities result in losses.
Vulnerability is a synonym for loss.
The method used to take advantage of a vulnerability is
known as a threat.
Question 8
0.25 out of 0.25 points
A _________ is the likelihood that a loss will occur.
Selected risk
Answer:
Answers: threat
risk
vulnerabil
ity
assessme
nt
Question 9
0 out of 0.25 points
Another term for risk mitigation is _______.
Selected risk
Answer:
management
Answers: risk reduction
risk
assessment
risk
management
risk
evaluation
Question 10
0.25 out of 0.25 points
What are often the weakest links in IT security?
Selected people
Answer:
Answers: environmental
threats
people