____________ assessments are objective, while ___________
assessments are subjective. Ans✓✓✓ Quantitative, qualitative
A business impact analysis is concerned with identifying and
implementing recovery methods. Ans✓✓✓ False
A business impact analysis is intended to include all IT functions.
Ans✓✓✓ False
A key step in managing risk is to first understand and manage the
source. Ans✓✓✓ True
A relative measurement of a resource's tolerance for risk exposure is:
Ans✓✓✓ Risk sensitivity
A risk assessment is the same as a risk management program. Ans✓✓✓
False
A Risk rating calculation = Ans✓✓✓ likelihood of vulnerability x
value of asset - % mitigated risks + uncertainty
A Security Scan and a Risk Assessment are the same. Ans✓✓✓ False
, According to Landoll, which of the following is NOT a type of security
test? Ans✓✓✓ Threat Testing
According to Talabis, what is the function of a BIA? Ans✓✓✓ To
assess and identify critical and non-critical organizational functions and
activities.
According to Talabis, what is the most rigorous and most encompassing
activity in the information security risk assessment process? Ans✓✓✓
Data Collection
According to the CIA triad, which of the following is a desirable
characteristic for computer security? Ans✓✓✓ Availability
All IT services and servers are equally critical. Ans✓✓✓ False
All of the following are reasons to perform risk assessments except?
Ans✓✓✓ It enables us to determine which risk assessment framework
we should be using
All vulnerabilities result in loss. Ans✓✓✓ False
An Risk Assessment team should focus both on critical areas and on
what management might consider important. Ans✓✓✓ True