Quiz: Module 01 Flashcards

1
Q

The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe.
a. disaster recovery plan
b. C.I.A. triad
c. strategic plan
d. asset classification

A

C.I.A. triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ is an unauthorized entry into the real or virtual property of another party.
a. Trespass
b. Risk
c. An accident
d. A Trojan horse

A

Trespass

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An evaluation of the threats to information assets, including a determination of their likelihood of occurrence and potential impact of an attack, is known as a _____.
a. loss estimate
b. threat assessment
c. threat likelihood
d. threat evaluation

A

threat assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The probability that a specific vulnerability within an organization will be attacked by a threat is known in the risk analysis process as _____.
a. impact
b. opportunity
c. likelihood
d. severity

A

likelihood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.
a. Inheritance
b. Acceptance
c. Avoidance
d. Mitigation

A

Acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is a risk treatment strategy that attempts to shift the risk to other assets, other processes, or other organizations.
a. Transference
b. Mitigation x
c. Acceptance x
d. Defense

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk management is the state of being secure and free from danger or harm.
a. True
b. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A threat is any event or circumstance that has the potential to adversely affect operations and assets.
a. True
b. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An enterprise information security policy (EISP) addresses specific areas of technology and contains a statement on the organization’s position on each specific area.
a. True
b. False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An asset can be logical, such as a Web site, information, or data; it can also be physical, such as a person, computer system, or other tangible object.
a. True
b. False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly