Domain 1 - Security and Risk Management Flashcards
- Within the realm of IT security , which of the following combinations best defines risk?
A. Threat coupled with a breach
B. Threat coupled with a vulnerability
C. Vulnerability coupled with an attack
D. Threat coupled with a breach of security
B
- When determining the value of an intangible asset which is the BEST approach?
A. Determine the physical storage costs and multiply by the expected life of the company
B. With the assistance of a finance accounting professional determine how much profit the asset has returned
C. Review the depreciation of the intangible asset over the past three years
D. Use the historical acquisition or development cost of the intangible asset
B
- Qualitative risk assessment is earmarked by which of the following?
A. Ease of implementation and it can be completed by personnel with a limited understanding of the risk assessment process
B. Can be completed by personnel with a limited understanding of the risk assessment process and uses detailed metrics used for calculation of risk
C. Detailed metrics used for calculation of risk and ease of implementation
D. Can be completed by personnel with a limited understanding of the risk assessment process and detailed metrics used for the calculation of risk.
A
- Single loss expectancy (SLE) is calculated by using:
A. Asset value and annualized rate of occurrence (ARO)
B. Asset value, local annual frequency estimate (LAFE), and standard annual frequency estimate (SAFE)
C. Asset value and exposure factor
D. Local annual frequency estimate and annualized rate of occurrence
C
*The formula for calculating SLE is SLE = asset value (in $) X exposure factor (loss in successful threat exploit, as %).
- Consideration for which type of risk assessment to perform includes all of the following:
A. Culture of the organization, likelihood of exposure and budget
B. Budget, capabilities of resources and likelihood of exposure
C. Capabilities of resources, likelihood of exposure and budget
D. Culture of the organization, budget, capabilities and resources
D
- Security awareness training includes:
A. Legislated security compliance objectives
B. Security roles and responsibilities for staff
C. The high-level outcome of vulnerability assessments
D. Specialized curriculum assignments, coursework and an accredited institution
B
- What is the minimum and customary practice of responsible protection of assets that affects a community or societal norm?
A. Due diligence
B. Risk mitigation
C. Asset protection
D. Due care
D
- Effective security management:
A. Achieves security at the lowest cost
B. Reduces risk to an acceptable level
C. Prioritizes security for new products
D. Installs patches in a timely manner
B
- Availability makes information accessible by protecting from:
A. Denial of services, fires, floods, hurricanes, and unauthorized transactions
B. Fires, floods, hurricanes, unauthorized transactions and unreadable backup tapes
C. Unauthorized transactions, fires, floods, hurricanes and unreadable backup tapes
D. Denial of services, fires floods, and hurricanes and unreadable backup tapes.
D
- Which phrase best defines a business continuity/disaster recover plan?
A. A set of plans for preventing a disaster.
B. An approved set of preparations and sufficient procedures for responding to a disaster.
C. A set of preparations and procedures for responding to a disaster without management approval.
D. The adequate preparations and procedures for the continuation of all organization functions.
D
- Which of the following steps should be performed first in a business impact analysis (BIA)?
A. Identify all business units within an organization
B. Evaluate the impact of disruptive events
C. Estimate the Recovery Time Objectives (RTO)
D. Evaluate the criticality of business functions
A
- Tactical security plans are BEST used to:
A. Establish high-level security policies
B. Enable enterprise/entity-wide security management
C. Reduce downtime
D. Deploy new security technology
D
- Who is accountable for implementing information security?
A. Everyone
B. Senior management
C. Security officer
D. Data owners
C
- Security is likely to be most expensive when addressed in which phase?
A. Design
B. Rapid prototyping
C. Testing
D. Implementation
D
- Information systems auditors help the organization:
A. Mitigate compliance issues
B. Establish an effective control environment
C. Identify control gaps
D. Address information technology for financial statements
C