Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISOL 533 Midterm Exam with Correct Answers-Graded A+

Beoordeling
-
Verkocht
-
Pagina's
26
Cijfer
A+
Geüpload op
16-08-2021
Geschreven in
2021/2022

Question 1 0.25 out of 0.25 points When would someone ask, “Would a reasonable person be expected to manage this risk?” Selected Answer: when applying a reasonableness test Answers: when performing a risk assessment when applying a reasonableness test when applying the reasonable person standard when performing a cost/benefit analysis  Question 2 0.25 out of 0.25 points When a threat exploits a vulnerability, it results in a(n) __________. Selected Answer: loss Answers: impac t loss crime liabilit y  Question 3 0.25 out of 0.25 points As a top-level executive at your own company, you are worried that your employees may steal confidential data too easily by downloading and taking home data onto thumb drives. What is the best way to prevent this from happening? Selected Answer: Create and enforce a written company policy against the use of thumb drives, and install a technical controls on the computers that will prevent the use of thumb drives. Answers: Install a technical control to prevent the use of thumb drives. Instruct higher level employees to inform their employees that the use of a thumb drive is a fireable offense. Hold a seminar that explains to employees why the use of thumb drives in the workplace is a security hazard. Create and enforce a written company policy against the use ofthumb drives, and install a technical controls on the computers that will prevent the use of thumb drives.  Question 4 0.25 out of 0.25 points Risk __________ is the practice of identifying, assessing, controlling, and mitigating risks. Selected Answer: managem ent Answers: assessme nt mitigation managem ent evaluatio n  Question 5 0 out of 0.25 points What is NOT an example of an intangible value? Selected Answer: cost of gaining a consumer Answers: future lost revenue cost of gaining a consumer customer influence data  Question 6 0.25 out of 0.25 points What is the primary reason to avoid risk? Selected Answer: The impact of the risk outweighs the benefit of the asset. Answers: Risks create vulnerabilities and threats. The impact of the risk outweighs the benefit of the asset. Risks are easily exploited. Risks can destroy a business.  Question 7 0 out of 0.25 points Identify the true statement.Selected Answer: Vulnerability is a synonym for loss. Answers: Exploited vulnerabilities result in losses. All vulnerabilities result in losses. Vulnerability

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

 Question 1
0.25 out of 0.25 points
When would someone ask, “Would a reasonable person be expected to
manage this risk?”
Selected when applying a reasonableness
Answer:
test
Answers: when performing a risk assessment
when applying a reasonableness
test
when applying the reasonable
person standard
when performing a cost/benefit
analysis
 Question 2
0.25 out of 0.25 points
When a threat exploits a vulnerability, it results in a(n) __________.
Selected loss
Answer:
Answers: impac
t
loss
crime
liabilit
y
 Question 3
0.25 out of 0.25 points
As a top-level executive at your own company, you are worried that your
employees may steal confidential data too easily by downloading and
taking home data onto thumb drives. What is the best way to prevent this
from happening?
Selected Create and enforce a written company policy against the use of
Answer:
thumb drives, and install a technical controls on the computers
that will prevent the use of thumb drives.
Answers: Install a technical control to prevent the use of thumb drives.
Instruct higher level employees to inform their employees that
the use of a thumb drive is a fireable offense.
Hold a seminar that explains to employees why the use of thumb
drives in the workplace is a security hazard.
Create and enforce a written company policy against the use of

, thumb drives, and install a technical controls on the computers
that will prevent the use of thumb drives.
 Question 4
0.25 out of 0.25 points
Risk __________ is the practice of identifying, assessing, controlling, and
mitigating risks.
Selected managem
Answer:
ent
Answers: assessme
nt
mitigation
managem
ent
evaluatio
n
 Question 5
0 out of 0.25 points
What is NOT an example of an intangible value?
Selected cost of gaining a
Answer:
consumer
Answers: future lost revenue
cost of gaining a
consumer
customer influence
data
 Question 6
0.25 out of 0.25 points
What is the primary reason to avoid risk?
Selected The impact of the risk outweighs the benefit
Answer:
of the asset.
Answers: Risks create vulnerabilities and threats.
The impact of the risk outweighs the benefit
of the asset.
Risks are easily exploited.
Risks can destroy a business.
 Question 7
0 out of 0.25 points
Identify the true statement.

, Selected Vulnerability is a synonym for loss.
Answer:
Answers: Exploited vulnerabilities result in losses.
All vulnerabilities result in losses.
Vulnerability is a synonym for loss.
The method used to take advantage of a vulnerability is
known as a threat.
 Question 8
0.25 out of 0.25 points
A _________ is the likelihood that a loss will occur.
Selected risk
Answer:
Answers: threat
risk
vulnerabil
ity
assessme
nt
 Question 9
0 out of 0.25 points
Another term for risk mitigation is _______.
Selected risk
Answer:
management
Answers: risk reduction
risk
assessment
risk
management
risk
evaluation
 Question 10
0.25 out of 0.25 points
What are often the weakest links in IT security?
Selected people
Answer:
Answers: environmental
threats
people

Geschreven voor

Vak

Documentinformatie

Geüpload op
16 augustus 2021
Aantal pagina's
26
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Themanehoppe American Intercontinental University Online
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
345
Lid sinds
4 jaar
Aantal volgers
224
Documenten
3784
Laatst verkocht
6 dagen geleden

3.5

55 beoordelingen

5
25
4
7
3
7
2
3
1
13

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen