Risk Identification, Monitoring and Analysis Flashcards

1
Q

What is an acceptable use policy?

A

Administrative statement of what company provided IT systems can be used for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is annualized rate of occurrence (ARO)?

A

Number of times a risk event is anticipated to occur within a calendar year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can Common Vulnerability and Exposures (CVE) data provide everything you need to secure your systems?

A

No, because of customized needs are not provided

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an existential risk?

A

Risk of such impact that can put a business out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How would you use CVE data?

A

As your own systems vulnerability assessment and to guide hardening efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are MAO, MTO, and MTPOD?

A
  • Maximum tolerable outage
  • Maximum allowable outage
  • Maximum tolerable period of disruption

Longest time that a system can be inoperable before intolerable damage is done to the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SLE?

A

Single loss expectancy, the damages or loss anticipated by a single occurrence of a risk event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What ways can you assess risk?

A

Base it on the impacts or anticipated losses to organizational outcomes or goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a zero day exploit?

A

Exploitation of an unreported vulnerability in commercial or widely available software or firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between security classification and categorization?

A

Classification determines the type and severity of the impact or loss of any aspect of the security of an information asset

Categorization groups together assets with the same classification or that share the same compliance requirements for security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What do SOAR systems approaches mean for security operations?

A
  • Security orchestration, automation, and response (SOAR) brings together multiple security information systems and sources
  • Provide workflows and playbooks to automate procedures and action to control the operation of security systems

Together provides the organization with a combination of detailed insight based on analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly