Lesson 15: Explain Risk Management Processes Flashcards

1
Q

What are the methods used for risk identification and assessment?

A

Recognize threats like malware, insider risks, equipment failures, and inadequate policies using vulnerability assessments, penetration testing, and audits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does risk analysis differ from risk assessment?

A

Risk Analysis: Identifies risks.

Risk Assessment: Evaluates likelihood and impact to prioritize management strategies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What metrics are used in quantitative risk analysis?

A

Uses metrics like Single Loss Expectancy (SLE), Annualized Loss Expectancy (ALE), and Exposure Factor (EF) to assign monetary values to risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is qualitative risk analysis, and what does it focus on?

A

Frames risks using subjective judgments, focusing on causes and interdependencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are heat maps and FIPS 199 categorizations used in risk management?

A

They visualize risks using severity levels like low, moderate, and high as the categories.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the primary risk management strategies?

A

Mitigation, Avoidance, Acceptance, and Transference (e.g., cybersecurity insurance).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are residual risk and risk appetite?

A

Residual Risk is the remaining risk after mitigation.

Risk Appetite defines tolerance levels across the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the phases of the risk management process?

A

Identify mission essential functions.

Recognize vulnerabilities.

Identify threats.

Assess business impacts.

Define appropriate risk responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What factors are considered in vendor due diligence and assessment?

A

Evaluate vendors based on financial stability, regulatory compliance, and security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are conflict-of-interest risks in vendor relationships?

A

Financial, personal, or competitive relationships that could affect integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What techniques are used to evaluate the vendor?

A

Penetration Testing: Evaluate the vendor’s security resilience.

Right-to-Audit Clauses & Internal Audits: Ensure adherence to security and compliance measures.

Supply Chain Analysis: Assess risks across interconnected vendor networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What legal agreements manage vendor relationships?

A

MOUs (Memorandum of Understanding): Set preliminary intentions.

NDAs (Nondisclosure Agreements): Secure sensitive information.

SLAs (Service Level Agreements): Define performance metrics.

SOWs (Statements of Work): Detail deliverables, timelines, and scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is ongoing vendor performance monitored?

A

Through performance reviews and risk evaluations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the purposes of internal audits, external assessments, and self-assessments?

A

Internal Audits: Evaluate compliance and facilitate continuous improvement.

External Assessments: Provide independent, objective reviews.

Self-Assessments: Help individuals and teams proactively identify strengths and weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the methods used during reconnaissance in penetration testing?

A

Active Methods: Port scanning.

Passive Methods: OSINT gathering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three penetration testing methods?

A

Known,
Partially Known,
Unknown Testing Methods.

You as the penetration tester tailor tests based on prior knowledge of the environment.

17
Q

What distinguishes known, partially known, and unknown penetration testing methods?

A

Known Testing: Full knowledge of the environment is provided to testers.

Partially Known Testing: Limited information is given.

Unknown Testing: Testers have no prior knowledge of the environment.

18
Q

What is offensive (Red Teaming) and defensive (Blue Teaming) testing?

A

Red Teaming: Simulates real-world attacks to identify vulnerabilities.

Blue Teaming: Evaluates detection and response capabilities.

19
Q

What is Physical Penetration Testing?

A

Simulates real-world attacks to assess the effectiveness of an organization’s physical security measures, evaluating vulnerabilities like access control, perimeter security, and employee awareness.

20
Q

What is integrated penetration testing?

A

It combines offensive, defensive, and physical testing for a holistic security evaluation.