Risk Management Flashcards

1
Q

Which risk treatment approach involves deciding not to undertake actions or engage in activities that introduce or increase risk?
A. Mitigate
B. Avoid
C. Transfer
D. Accept

A

B. Avoid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which is a form of structured data document that represents a compilation of information related to vulnerabilities, risks, and countermeasures and serves as a repository of identified risks, impact, scenarios, and potential responses?
A. Register
B. Matrix
C. Archive
D. CMDB

A

A. Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which are common types of security reporting techniques? Choose more than one option.
A. Live presentations (in-person or conferencing sessions)
B. Published to an intranet
C. Written reports and summaries
D. Request for comments
E. White papers and special publications
F. Service desk tickets

A

A. Live presentations (in-person or conferencing sessions)
B. Published to an intranet
C. Written reports and summaries
E. White papers and special publications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which term describes the vulnerability that remains AFTER the mitigating controls are introduced?
A. Inherent risk
B. Residual risk
C. Positive risk
D. Total risk

A

B. Residual risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a scientific/mathematical approach to getting monetary and numeric probabilities based on the percentages, mathematical formulas, and calibrated estimation?
A. Quantitative analysis
B. Qualitative analysis
C. Gap analysis
D. Risk analysis

A

A. Quantitative analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these are common approaches to risk identification and assessment? Choose more than one option.
A. Asymmetric
B. Recurring
C. Centralized
D. One-time
E. Ad hoc
F. Continuous

A

B. Recurring
D. One-time
E. Ad hoc
F. Continuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What business impact analysis method represents the absolute maximum amount of time that a resource, service, or function can be unavailable before the entity start to experience a catastrophic loss?
A. MTBF
B. RPO
C. MTTR
D. MTD

A

D. MTD (Maximum Tolerable Downtime)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly