Chapter 1 Risk Management Flashcards

1
Q

A script kiddie is a classic example of a

A

threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Risk is often considered formulaically as

A

Risk=Probability x Impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A company makes a document called “Acceptable Use” that defines what the company allows users to do and not to do on their work systems. The company requires new employees to read and sign this. What is this type of document called?

A

Policies are normally written documents that define an organization’s goals and actions. Acceptable use policies are very common.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A__________is a description of a complex process, concentrating on major steps and the flows between the steps.

A

framework

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A no Trespassing sign is an example of a _________ control.

A

deterrent control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A lock on the door of a building is an example of a _________ control.

A

preventative control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An asset’s exposure factor is measured in __________.

A

Exposure factor is measured in terms of a percentage of loss to the value of that asset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the equation for Single Loss Expectancy?

A

Single Loss Expectancy = Asset Value x Exposure Factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Financial is one type of business impact. Which of the following names another? 
A. Pride
B. Technical
C. Device
D. Reputation
A

Reputation is a common business impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following represents the component manufacturer's best guess (based on historical data) regarding how much time will pass between major failures of that component?
A. MTTR
B. MTBF
C.MTMB
D.MOAB
A

Mean Time Between Failures (MTBF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Combining and administrative control with a technical control is an example of?

A

Control diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Using several vendors for equipment and services is referred to as

A

Vendor Diversity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the NIST SP 800-30 Rev 1 four-step risk assessment process

A
  1. Prepare for assessment
  2. conduct assessment; Id threat, vulnerability,
  3. Communicate results
  4. Maintain assessment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

an ongoing process of identifying each vulnerabilities and then applying some form of security control to mitigate risk that vulnerability exposes is

A

Risk Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat sources, likelihood of occurrence, and impact describe

A

Concepts of Risk Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NIST Special Publication 800-30 Rev 1

A

Guide for Conducting Risk Assessments

17
Q

Risk assessment references can be found in what two publications

A

NIST 800-30 Rev 1 and ISACA

18
Q

To combine different types of controls to provide better security is an example of

A

Control diversity

19
Q

Fences, door locks, elevator floor blockers, and bio-metric scanners are examples of

A

Physical controls

20
Q

What is the greatest weakness in all IT infrastructures?

A

Network Users

21
Q

How often should user training be conducted?

A

Initial and throughout their association

22
Q

What does user training cover?

A

password usage, personal security, and the ability to recognize attacks.

23
Q

How can security control strategies be more effective?

A

Combining security controls to work together, you get better security

24
Q

How many types of security controls?

A

There are 3 types of security controls

25
Q

What are the 3 types of control types?

A

Technical, administrative, and physical

26
Q

Requiring all edge routers must be able to communicate on SNMPv3 is what type of control?

A

Technical Control

27
Q

All users must log off their workstations every time they leave their office is what type of control?

A

Administrative Control

28
Q

Deterrent Controls are defined as

A

deterring a potential attacker from even attempting an attack.

29
Q

Preventative Controls are defined as

A

attempts to keep an active attack from succeeding.

30
Q

Mitigation

A

reducing threats posed against an organization and their impact

31
Q

EXAM TIP know U.S. laws such as HIPAA, SOX, and PCI-DSS.

A

A single IT infrastructure would never have more than one chief security officer.

32
Q

Quantitative Assessment is defined as

A

based on objective data typically, numerical data.

33
Q

What are the four categories of Risk Response techniques?

A

Mitigate, Transfer, Accept, and Avoid

34
Q

A business impact analysis (BIA) is designed to mitigate the effects of an incident, not to prevent an incident.

A

A BIA is part of a field of study in IT Security called contingency planning or CP that goes hand in hand with CompTIA Security +

35
Q

BIA looks at what 5 types of impact

A

Frpps - Financial, reputation, property, privacy, safety/life

36
Q

stop page 33

A

stop 33