IS3110 CHAP 6 Flashcards
You are beginning an RA for a system. You should define both the operational characteristics and the mission of the system in the early stages of the RA.
TRUE OR FALSE
TRUE
Which of the following should you identify during a risk assessment?
- Assets
- Threats
- Vulnerabilities
- Countermeasure
- All the above
Assets
Threats
Vulnerabilities
Countermeasure
Of the following choices, what would be considered an asset?
- Hardware
- Software
- Personnel
- Data and information
- All the above
Hardware
Software
Personnel
Data and information
When defining the system for the risk assessment, what should you ensure is included?
- Only the title of the system
- The current configuration of the system
- A list of possible attacks
- A list of previous risk assessments
The current configuration of the system
What can you use to identify relevant vulnerabilities?
- Historical data
- Threat modeling
- CBA
- A and B only
- None of the above
None of the above
Which type of assessment can you perform to identify weaknesses in a system without exploiting the weaknesses?
- Vulnerability assessment
- Risk assessment
- Exploit assessment
- Penetration test
Vulnerability assessment
An acceptable use policy is an example of an ___ security control.
Administrative
Your organization requires users to log on with smart cards. This is an example of a ___ security control.
Technical
You use video cameras to monitor the entrance of secure areas of your building. This is an example of a ___ security control.
Physical
Which of the following should you match with a control to mitigate a relevant risk?
- Threats
- Vulnerabilities
- Threat/vulnerability pair
- Residual risk
Threat/vulnerability pair
What does a qualitative RA use to prioritize a risk?
- Probability and impact
- SLE, ARO, and ALE
- Safeguard value
- Cost-benefit analysis
Probability and impact
What does a quantitative RA use to prioritize a risk?
- Probability and impact
- SLE, ARO, and ALE
- Safeguard value
- Cost-benefit analysis
SLE, ARO, and ALE
Your organization purchased a control and installed it on several servers. This control is consuming too many server resources, and the servers can no longer function. What was not evaluated before the control was purchased?
- The cost and time to implement the control
- The operational impact of the control
- The in-place and planned controls
- The impact of the risk
The operational impact of the control
What is included in an RA that helps justify the cost of a control?
- Probability and impact
- ALE
- CBA
- POAM
CBA
What is created with a risk assessment to track the implementation of the controls?
- CBA
- POAM
- ALE
- SLE
POAM