Risk Mgmt Flashcards

1
Q

data classification mechanism objective

A

cost reduction more than security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data purging responsibility

A

data owner.. more functional role than security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COBIT provides

A
Control objectives
Control Practices
Goal indicators
Performance indicators
success factors
Maturity Models
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Delayed loss risk

A

Employee Productivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Qualitative risk analysis

A

Threat modeling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Standards

A

Rules on how to accomplish policy objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Risk Analysis is related to

A

uncertainty analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BC & DR provides

A

compensating control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Policy developement Lifecycle

A

initiation, evaluation, development, approval, publication, implementation, maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If data is going to be used by more people

A

it should be more securely controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

To classify the data, data owner should evaluate

A

CIA requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

effective security program needs balanced

A

technical and non technical methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Truly quantitative risk analysis is not possible because

A

quantitative measures must be applied to qualitative elements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

technical focused policies

A

system specific

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

key for any project such as risk analysis

A

project sizing, scope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SABSA - Sherwood Applied Business Security Arch

A

6 layers for more focus and preciseness. Each layer represents different view of organization

17
Q

Identifying failures in complex environments

A

Fault Tree analysis

18
Q

Common methods to test security level of an environment

A
Wardialing
Log review
Password cracking
Penetration testing
Vulnerability testing
network mapping