Deck 4: Information Security Governance and Risk Management

ملء الشاشة (f)
exit full mode
سؤال
A countermeasure reduces the potential risk.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The Zachman Framework is an enterprise architecture framework.
سؤال
The first step of a risk assessment is to identify threats and vulnerabilities.
سؤال
Tangible assets include intellectual property, data, and organizational reputation.
سؤال
A quantitative risk analysis does not assign monetary and numeric values to all facets of the risk analysis process.
سؤال
One of the disadvantages of qualitative risk analysis is that all results are subjective.
سؤال
After an organization understands its total and residual risk, it must determine how to get rid of the risk.
سؤال
Policies are broad and provide the foundation for development of standards, baselines, guidelines, and procedures.
سؤال
Commercial organizations usually classify data using five main classification levels: Top Secret, Secret, Confidential, Sensitive but Unclassified, and Unclassified.
سؤال
The data custodian implements the information classification and controls after they are determined.
سؤال
What is the probability that a threat agent will exploit vulnerability and the impact if the threat is carried out?

A) Exposure
B) Countermeasure
C) Risk
D) Due diligence
سؤال
Which of the following is an enterprise security architecture framework?

A) MODAF
B) TOGAF
C) ITIL
D) SABSA
سؤال
According to the NIST SP 800-30, what is the last step of a risk assessment?

A) Determine risk as a combination of likelihood and impact.
B) Identify impact.
C) Determine likelihood.
D) Identify threats.
سؤال
Which threat agent group includes malicious users?

A) Natural
B) Human
C) Technical
D) Operational
سؤال
Which calculation uses the formula AV × EF?

A) SLE
B) ARO
C) ALE
D) Cost-benefit analysis
سؤال
What is the calculation you should use for safeguard value?

A) (ALE before safeguard) + (ALE after safeguard) - (annual cost of safeguard)
B) (ALE before safeguard) - (ALE after safeguard) - (annual cost of safeguard)
C) (ALE before safeguard) - (ALE after safeguard) + (annual cost of safeguard)
D) (ALE before safeguard) + (ALE after safeguard) + (annual cost of safeguard)
سؤال
Which risk handling method defines the acceptable risk level the organization can tolerate and reduces the risk to that level?

A) Risk avoidance
B) Risk transfer
C) Risk mitigation
D) Risk acceptance
سؤال
What is a baseline?

A) Recommended actions that are more flexible than standards
B) All the detailed actions that personnel are required to follow
C) Mandatory actions that describe how policies will be implemented within an organization
D) A reference point defined and captured to be used as a future reference
سؤال
Which type of data includes patents, trade secrets, and other information that could seriously affect the government if unauthorized disclosure occurred?

A) Confidential
B) Top secret
C) Secret
D) Sensitive
سؤال
Which role evaluates the security needs of the organization and develops the internal information security governance documents?

A) Security administrator
B) Security analyst
C) Data custodian
D) Data owner
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Information Security Governance and Risk Management
1
A countermeasure reduces the potential risk.
True
2
The Zachman Framework is an enterprise architecture framework.
True
3
The first step of a risk assessment is to identify threats and vulnerabilities.
False
4
Tangible assets include intellectual property, data, and organizational reputation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
A quantitative risk analysis does not assign monetary and numeric values to all facets of the risk analysis process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
One of the disadvantages of qualitative risk analysis is that all results are subjective.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
After an organization understands its total and residual risk, it must determine how to get rid of the risk.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Policies are broad and provide the foundation for development of standards, baselines, guidelines, and procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Commercial organizations usually classify data using five main classification levels: Top Secret, Secret, Confidential, Sensitive but Unclassified, and Unclassified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
The data custodian implements the information classification and controls after they are determined.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
What is the probability that a threat agent will exploit vulnerability and the impact if the threat is carried out?

A) Exposure
B) Countermeasure
C) Risk
D) Due diligence
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following is an enterprise security architecture framework?

A) MODAF
B) TOGAF
C) ITIL
D) SABSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
According to the NIST SP 800-30, what is the last step of a risk assessment?

A) Determine risk as a combination of likelihood and impact.
B) Identify impact.
C) Determine likelihood.
D) Identify threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which threat agent group includes malicious users?

A) Natural
B) Human
C) Technical
D) Operational
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which calculation uses the formula AV × EF?

A) SLE
B) ARO
C) ALE
D) Cost-benefit analysis
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
What is the calculation you should use for safeguard value?

A) (ALE before safeguard) + (ALE after safeguard) - (annual cost of safeguard)
B) (ALE before safeguard) - (ALE after safeguard) - (annual cost of safeguard)
C) (ALE before safeguard) - (ALE after safeguard) + (annual cost of safeguard)
D) (ALE before safeguard) + (ALE after safeguard) + (annual cost of safeguard)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which risk handling method defines the acceptable risk level the organization can tolerate and reduces the risk to that level?

A) Risk avoidance
B) Risk transfer
C) Risk mitigation
D) Risk acceptance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
What is a baseline?

A) Recommended actions that are more flexible than standards
B) All the detailed actions that personnel are required to follow
C) Mandatory actions that describe how policies will be implemented within an organization
D) A reference point defined and captured to be used as a future reference
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which type of data includes patents, trade secrets, and other information that could seriously affect the government if unauthorized disclosure occurred?

A) Confidential
B) Top secret
C) Secret
D) Sensitive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which role evaluates the security needs of the organization and develops the internal information security governance documents?

A) Security administrator
B) Security analyst
C) Data custodian
D) Data owner
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.