Week 10-2 Flashcards

1
Q

What is a vulnerability-oriented analysis?

A

Identify and rank a set of exploitable weaknesses to determine how to mitigate or deal with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of risk management?

A

To measure the impact of a threat and the cost to implement controls or countermeasures to mitigate that threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does it mean to accept a risk?

A

Acknowledge the risk when the cost of mitigation is higher than the impact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does avoiding a risk involve?

A

Discontinuing activities or operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does transferring a risk mean?

A

Sharing the risk with a third party, like outsourcing or purchasing cyber insurance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does mitigating a risk involve?

A

Implementing security measures and controls to reduce the impact or the probability of happening.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the categories of controls in cyber security?

A
  • Administrative Control
  • Technical Control
  • Physical Control.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a preventive control?

A

Prevents incidents from occurring, employed before an event occurs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a detective control?

A

Monitors and detects different types of unauthorized behavior or activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a corrective control?

A

Implements after an event has occurred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a recovery control?

A

Restores resources, functions, and capabilities back to a normal state after an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a compensative control?

A

Alternative options put in place to satisfy security requirements that are either impractical or too difficult to implement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly