Perform Risk Management Activities Flashcards

1
Q

A U.S. government agency has contracted a risk auditor to conduct a risk assessment. Which framework should the auditor use?

A

NIST RMF

The National Institute of Standards and Technology Risk Management Framework (NIST RMF) defines standards that US Federal Agencies must use to assess and manage cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A security manager is standing up a risk management program at a company. What should the security manager set up that might be considered the most recognized output?

A

Risk Register

The risk register can be the most recognized output of the risk management program. It includes metadata such as threat, impact, likelihood, plan, and risk level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A vulnerability management lead for a major company is working with various teams to keep their company secure, but there are a significant amount of legacy systems the company worries about, so the management lead recommends purchasing an insurance policy. What type of risk strategy is this?

A

Risk transference

Risk transference (or sharing) refers to assigning risk to a third party. Purchasing an insurance policy most typically exemplifies risk transference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A security engineer works for a mid-sized retail company on the systems administration team. One of the web servers went down, and customers were unable to purchase goods they provide, and the company suspects the customers purchased the same goods elsewhere. What is this considered?

A

SLE

Single Loss Expectancy (SLE) is the amount lost in a single occurrence of the risk factor, such as the cost during downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A security project manager is considering transitioning to a cloud-based strategy for a company. The company currently operates with a minimal team in their data center services and aims to reduce their responsibilities while maintaining service quality. Which cloud solution would require the least amount of management and maintenance from this team?

A

SaaS

Software as a Service (SaaS) represents the lowest amount of responsibility for the customer as the facilities, utilities, physical security, platform, and applications are the provider’s responsibility.

Infrastructure as a Service (IaaS) provides hardware hosted at a provider facility, using the provider’s physical security controls and utilities, such as power.

Platform as a Service (PaaS) provides a selection of operating systems loaded and configured by the customer. The underlying infrastructure, facilities, utilities, and physical security are the provider’s responsibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two major components of risk?

A

Impact and Likelihood

Impact is the severity of the risk when realized. Determining factors include the scope, the value of the asset, or the financial impacts of the event.

The likelihood of occurrence is the probability that a threat is taking place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A security engineer is considering moving his organization’s IT services to the cloud but is concerned whether the vendor they are considering will be in business on an ongoing basis. What type of vendor assessment is this?

A

Vendor viability

Vendor viability considers whether a vendor will remain in business on an ongoing basis, that they have a viable and in-demand product, and the financial means to stay afloat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A security architect for an organization is conducting an internal assessment on current policies, processes, and procedures to ensure protection for the businesses’ technology and financial operations. Which of the following would be best suited to support this assessment?

A

SOC

System and Organization Controls (SOC) uses standards established by the American Institute of Certified Public Accountants (AICPA) to evaluate policies, processes, and procedures to protect technology and financial operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A security architect is planning a Statement of Work to perform services at various levels of the Risk Management Lifecycle. The security architect should allocate the most hours to which phase?

A

Control

The control phase identifies effective ways to reduce identified risks. The effective identification and implementation of these controls represent a significant amount of the work effort undertaken by security practitioners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A security engineer at a software company is currently analyzing its supply chain. What would the company’s supply chain most likely involve?

A

Source code repositories, Development language, and Third-party libraries

For a software company, the supply chain may include source-code repositories. For example, Java started charging licensing fees for using Java, so many companies have chosen to switch to OpenJDK as an alternative.

Software company supply chains may also include the development language. Code scanning is a major component of security.

Third-party libraries will also likely be a part of a software company’s supply chains. Supply chain attacks could slip shells in with third-party libraries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly