IT RIsk Management Quiz Flashcards

1
Q

Two fundamental components affecting the trustworthiness of information systems are ______ and ______.

A

Security Functionality

Security Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security controls are classified: ______, ______, and ______.

A

Management
Operational
Technical Controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ risk assessment most effectively supports cost-benefit analyses of alternative risk responses or courses of action.

A

Quantitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ risk assessments typically employ a set of methods, principles, or rules for assessing risk based on non-numerical categories.

A

Qualitative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Risk management reduces risks by defining and controlling \_\_\_\_\_\_ and \_\_\_\_\_\_.
A. Threats
B. Vulnerabilities
C. Adverse Impacts
D. Likelihood
A

A. Threats

B. Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following is not a part of the risk management process as discussed in class? (Choose 1)
A. Framing Risk
B. Assessing Risk
C. Mitigating Risk
D. Monitoring Risk
A

C. Mitigating Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
The degree to which the systems can be expected to preserve the confidentiality, integrity, and availability of the information systems is called: (Choose 1)
A. System Integrity
B. Security Capability
C. Security Functionality
D. Risk Assurance
E. Trustworthiness
A

E. Trustworthiness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
When conducting a risk assessment, \_\_\_\_\_\_ is the highest priority and is always given the highest impact rating. (Choose 1)
A. Loss of Data Center
B. Loss of Reputation
C. Loss of Data
D. Loss of Intellectual Property
E. Loss of Life
A

E. Loss of Life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The integrity of data is not related to which of the following? (Choose 1)
A. Unauthorized manipulation
B. The modification of data without authorization
C. The intentional or accidental substitution of data
D. The extraction of data to share with unauthorized entities

A

D. The extraction of data to share with unauthorized entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Company X signs a service level agreement with their internet service provider (ISP), which requires the ISP to pay for all potential losses in the event of loss of connectivity. This is an example of: (Choose 1)
A. Risk Avoidance
B. Risk Mitigation
C. Risk Acceptance
D. Risk Transfer
A

D. Risk Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ is measured by the capabilities of the threat and the presence or absence of countermeasures

A

Likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Jared plays a role in his company’s data classification system. In this role, he must practice due care when accessing data and ensure that the data is used only in accordance with allowed policy while abiding by the rules set for the classification of the data. He does not determine, maintain, or evaluate controls, so what is Jared’s role? (Choose 1)
A. Data Owner
B. Data Custodian
C. Data User
D. Information Systems Auditor
A

C. Data User

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A CCTV (Closed Circuit TV) system that is monitored is an example of: (Choose 1)
A. Detective Control
B. Corrective Control
C. Compensating Control
D. Preventative Control
A

A. Detective Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IT governance is the responsibility of ______.

A

The Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Sue has been tasked with implementing a number of security controls, including antivirus and antispam software, to protect the company’s e-mail system. What type of approach is her company taking to handle the risk posed by the system? (Choose 1)
A. Risk Mitigation
B. Risk Acceptance
C. Risk Avoidance
D. Risk Transferance
A

A. Risk Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
The loss of productivity suffered by Company X due to malware per incident is 30%. Here, 30% is the \_\_\_\_\_\_. (Choose 1)
A. Single Loss Expectancy
B. Exposure Factor
C. Impact Variable
D. Impact Factor
E. None of the Above
A

B. Exposure Factor

17
Q
Which of the following is not a variable in rating/qualifying/computing likelihood? (Choose 1)
A. Impact
B. Skill
C. Ease of Access
D. Resources
E. Incentive
A

A. Impact

18
Q

______ is the legal team used to describe the care a “reasonable person” would exercise under given circumstances. (Choose 1)
A. Due Diligence
B. Due Care

A

B. Due Care

19
Q
The maximum amount of time that a system can be unavailable before there is an unacceptable impact on other systems is called: (Choose 1)
A. Recovery Point Objective (RPO)
B. Max Allowable Downtime (MAD)
C. Maximum Tolerable Downtime (MTD)
D. Recovery Time Objective (RTO)
A

D. Recovery Time Objective (RTO)

20
Q

As head of sales, Jim is the information owner for the sales department. Which of the following is not Jim’s responsibility as information owner? (Choose 1)
A. Assigning information classifications
B. Dictating how data should be protected
C. Verifying the availability of data
D. Determining how long to retain data

A

C. Verifying the availability of data

21
Q

Qualitative risk assessments are done in conjunction with a quantitative analysis since pure qualitative analysis is often not feasible.
A.True
B. False

A

B. False

22
Q

Due care leads to due diligence.
A. True
B. False

A

B. False

23
Q

Tier 3 risk is a component of Tier 1 risk.
A. True
B. False

A

A. True