Deck 4: Governance and Risk Management

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is a characteristic of the silo-based approach to cybersecurity?

A) Compliance is discretionary.
B) Security is the responsibility of the IT department.
C) Little or no organizational accountability exists.
D) All of the above
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
At which of the following states of the CMM scale are there no documented policies and processes?

A) Ad hoc
B) Defined process
C) Optimized
D) Nonexistent
سؤال
Which of the following best describes residual risk?

A) The likelihood of occurrence of a threat
B) The level of risk before security measures are applied
C) The level of risk after security measures are applied
D) The impact of risk if a threat is realized
سؤال
Which of the following statements best describes risk transfer?

A) It shifts a portion of the risk responsibility or liability to other organizations.
B) It shifts the entire risk responsibility to other organizations.
C) It takes steps to eliminate or modify the risk.
D) None of the above
سؤال
Which of the following is the objective of risk assessment?

A) Identify the inherent risk
B) Determine the impact of a threat
C) Calculate the likelihood of a threat occurrence
D) All of the above
سؤال
Which of the following risk assessment methodologies was originally developed by CERT?

A) FAIR
B) OCTAVE
C) RMF
D) CMM
سؤال
Which of the following risks relates to negative public opinion?

A) Operational risk
B) Strategic risk
C) Financial risk
D) Reputational risk
سؤال
Which of the following statements best describes strategic risk?

A) Risk that relates to monetary loss
B) Risk that relates to adverse business decisions
C) Risk that relates to loss resulting from inadequate or failed processes or systems
D) Risk that relates to violations of laws, rules, regulations, or policy
سؤال
Which of the following is the magnitude of harm?

A) Risk
B) Threat
C) Impact
D) Vulnerability
سؤال
The two approaches to cybersecurity are silo-based and __________.

A) integrated
B) operational
C) environmental
D) strategic
سؤال
Which of the following refers to directives that codify organizational requirements?

A) Guidelines
B) Standards
C) Policies
D) Baselines
سؤال
Which of the following is the leading membership organization for Boards and Directors in the U.S.?

A) ISO
B) NIST
C) CERT
D) NACD
سؤال
Which of the following is a systematic, evidence-based evaluation of how well an organization conforms to such established criteria as Board-approved policies, regulatory requirements, and internationally recognized standards, such as the ISO 27000 series?

A) Audit report
B) Cybersecurity audit
C) CMM
D) CISA
سؤال
In the NIST Cybersecurity Framework, which governance subcategory references legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations?

A) ID.GV-1
B) ID.GV-2
C) ID.GV-3
D) ID.GV-4
سؤال
Which of the following refers to how much of the undesirable outcome a risk taker is willing to accept in exchange for the potential benefit?

A) Risk tolerance
B) Risk mitigation
C) Risk management
D) Risk acceptance
سؤال
Which of the following refers to the level of risk before security measures are applied?

A) Residual risk
B) Vulnerability
C) Inherent risk
D) Impact
سؤال
Which of the following is the final step in the NIST Risk Assessment methodology?

A) Communicate the results.
B) Prepare for the assessment.
C) Conduct the assessment.
D) Maintain the assessment.
سؤال
Which of the following refers to the process of managing, directing, controlling, and influencing organizational decisions, actions, and behaviors?

A) Governance
B) Risk sharing
C) Risk management
D) CMM
سؤال
OCTAVE is short for which of the following?

A) Operationally Critical Threat, Assessment, and Vulnerability Evaluation
B) Operationally Critical Threat, Asset, and Vulnerability Evaluation
C) Optimized Critical Threat, Assessment, and Vulnerability Evaluation
D) Optimized Critical Threat, Asset, and Vulnerability Evaluation
سؤال
Which of the following provides a model for understanding, analyzing, and quantifying information risk in quantitative financial and business terms?

A) RMF
B) NIST
C) FAIR
D) OCTAVE
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Governance and Risk Management
1
Which of the following is a characteristic of the silo-based approach to cybersecurity?

A) Compliance is discretionary.
B) Security is the responsibility of the IT department.
C) Little or no organizational accountability exists.
D) All of the above
All of the above
2
At which of the following states of the CMM scale are there no documented policies and processes?

A) Ad hoc
B) Defined process
C) Optimized
D) Nonexistent
Ad hoc
3
Which of the following best describes residual risk?

A) The likelihood of occurrence of a threat
B) The level of risk before security measures are applied
C) The level of risk after security measures are applied
D) The impact of risk if a threat is realized
The level of risk after security measures are applied
4
Which of the following statements best describes risk transfer?

A) It shifts a portion of the risk responsibility or liability to other organizations.
B) It shifts the entire risk responsibility to other organizations.
C) It takes steps to eliminate or modify the risk.
D) None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is the objective of risk assessment?

A) Identify the inherent risk
B) Determine the impact of a threat
C) Calculate the likelihood of a threat occurrence
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following risk assessment methodologies was originally developed by CERT?

A) FAIR
B) OCTAVE
C) RMF
D) CMM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following risks relates to negative public opinion?

A) Operational risk
B) Strategic risk
C) Financial risk
D) Reputational risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following statements best describes strategic risk?

A) Risk that relates to monetary loss
B) Risk that relates to adverse business decisions
C) Risk that relates to loss resulting from inadequate or failed processes or systems
D) Risk that relates to violations of laws, rules, regulations, or policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is the magnitude of harm?

A) Risk
B) Threat
C) Impact
D) Vulnerability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
The two approaches to cybersecurity are silo-based and __________.

A) integrated
B) operational
C) environmental
D) strategic
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following refers to directives that codify organizational requirements?

A) Guidelines
B) Standards
C) Policies
D) Baselines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is the leading membership organization for Boards and Directors in the U.S.?

A) ISO
B) NIST
C) CERT
D) NACD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is a systematic, evidence-based evaluation of how well an organization conforms to such established criteria as Board-approved policies, regulatory requirements, and internationally recognized standards, such as the ISO 27000 series?

A) Audit report
B) Cybersecurity audit
C) CMM
D) CISA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
In the NIST Cybersecurity Framework, which governance subcategory references legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations?

A) ID.GV-1
B) ID.GV-2
C) ID.GV-3
D) ID.GV-4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following refers to how much of the undesirable outcome a risk taker is willing to accept in exchange for the potential benefit?

A) Risk tolerance
B) Risk mitigation
C) Risk management
D) Risk acceptance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following refers to the level of risk before security measures are applied?

A) Residual risk
B) Vulnerability
C) Inherent risk
D) Impact
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is the final step in the NIST Risk Assessment methodology?

A) Communicate the results.
B) Prepare for the assessment.
C) Conduct the assessment.
D) Maintain the assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following refers to the process of managing, directing, controlling, and influencing organizational decisions, actions, and behaviors?

A) Governance
B) Risk sharing
C) Risk management
D) CMM
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
OCTAVE is short for which of the following?

A) Operationally Critical Threat, Assessment, and Vulnerability Evaluation
B) Operationally Critical Threat, Asset, and Vulnerability Evaluation
C) Optimized Critical Threat, Assessment, and Vulnerability Evaluation
D) Optimized Critical Threat, Asset, and Vulnerability Evaluation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following provides a model for understanding, analyzing, and quantifying information risk in quantitative financial and business terms?

A) RMF
B) NIST
C) FAIR
D) OCTAVE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.