Domain 3 Flashcards
Which of the following formulas is used to calculate Risk?
a) Risk {due to a threat} = Vulnerability x Threat {to that vulnerability}
b) Risk {due to a vulnerability} = Vulnerability x Threat {to that vulnerability}
c) Risk {due to a threat} = Threat x Vulnerability {to that threat}
d) Risk {due to a vulnerability} = Threat x Vulnerability {to that threat}
Risk {due to a threat} = Threat x Vulnerability {to that threat}
In the formula displayed below, what does ‘Vulnerability’ represent? Risk = Threat x Vulnerability
a) Vulnerability to that specific threat
b) Vulnerability to threats in general
c) Vulnerability to unknown threats
d) Vulnerability to known threats
Vulnerability to that specific threat
Which of the following choices specifies a certain way in which something should be done or a certain brand or type of equipment that must be used?
a) Standard
b) Baseline
c) Policy
d) Procedure
Standard
After you install a well-configured firewall, a web site inside your perimeter is defaced by an outside attack. Which security principal has NOT been addressed?
a) Defense-in-Depth
b) Deny all, then allow as needed
c) Least possible privilege
d) Know your system
Defense-in-Depth
When a threat connects to its vulnerability, what is the result?
a) Reduced risk
b) Possible system compromise
c) Increased impact
d) Increased uncertainty
Possible system compromise
Which of the following is the most common defense tactic?
a) Establishing a strong security policy
b) Applying software patches as soon as possible
c) Deploying perimeter defenses such as firewalls
d) Replacing hubs with switches
Deploying perimeter defenses such as firewalls
The Risk Management option to “accept the risk” is most reasonable after which of the following steps has been taken?
a) Perform penetration testing
b) Identify the probable threats
c) Deploy a perimeter defense
d) Mitigate or reduce the risk
Mitigate or reduce the risk
Of the following, which best describes the ‘insurance model’ of Risk Management?
a) Pass the risk over to a third-party.
b) Redirect the cost of insurance into Risk Avoidance efforts.
c) Follow best practices to insure security.
d) Ignore the risk
Pass the risk over to a third-party
In the formula displayed below, what does the “Exposure Factor” represent? Single Loss Expectancy = Asset Values X Exposure Factor
a) The degree to which an asset is vulnerable to attack.
b) The percentage of loss a threat event would have on the asset.
c) The cost to reduce the risk that an asset is subject to.
d) The likelihood that a threat would escalate into an event.
The percentage of loss a threat event would have on the asset
Which of the following are the two common approaches to risk assessment?
a) Proactive and Reactive
b) In-house and vendor provided
c) Open Source and Closed Source
d) Qualitative and Quantitative
Qualitative and Quantitative
Which of the following methods of risk assessment is the more valuable tool for business decision-making?
a) The Legal exposure method
b) The Human resources method
c) The Quantitative method
d) The Heuristic method
The Quantitative method
Which of the following statements is TRUE?
a) Risk Management is as much about Security as anything.
b) Threats are as much about Risk Management as anything.
c) Vulnerabilities are as much about Security as anything.
d) Security is as much about Risk Management as anything.
Security is as much about Risk Management as anything
Of the following, which best describes the ‘insurance model’ of Risk Management?
a) Redirect the cost of insurance into Risk Avoidance efforts.
b) Follow best practices to insure security.
c) Pass the risk over to a third-party.
d) Escrow adequate funds to insure timely Risk Recovery.
Pass the risk over to a third-party
Which approach to Risk Assessment tries to assign an objective numeric value to describe the degree of risk?
a) The Qualitative approach
b) The Heuristic approach
c) The Elliptical Curve approach
d) The Quantitative approach
The Quantitative approach
Which approach to risk assessment focuses on the more intangible values to describe the degree of risk?
a) The Qualitative approach
b) The Quantitative approach
c) The Ephemeral approach
d) The Consensus approach
The Qualitative approach