Deck 14: It Security Management and Risk Assessment

ملء الشاشة (f)
exit full mode
سؤال
Organizational security objectives identify what IT security outcomes
should be achieved.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
It is not critical that an organization's IT security policy have full
approval or buy-in by senior management.
سؤال
A threat may be either natural or human made and may be accidental
or deliberate.
سؤال
Once the IT management process is in place and working the process
never needs to be repeated.
سؤال
IT security management functions include:

A)determining organizational IT security objectives,strategies,and policies
B)detecting and reacting to incidents
C)specifying appropriate safeguards
D)all of the above
سؤال
IT security needs to be a key part of an organization's overall
management plan.
سؤال
__________ ensures that critical assets are sufficiently protected in a cost-effective manner.

A)IT control
B)IT security management
C)IT discipline
D)IT risk implementations
سؤال
Implementing the risk treatment plan is part of the ______ step.

A)check
B)act
C)do
D)plan
سؤال
IT security management consists of first determining a clear view of an
organization's IT security objectives and general risk profile.
سؤال
The assignment of responsibilities relating to the management of IT
security and the organizational infrastructure is not addressed in a
corporate security policy.
سؤال
Organizational security policies identify what needs to be done.
سؤال
A major advantage of the informal approach is that the individuals
performing the analysis require no additional skills.
سؤال
IT security management has evolved considerably over the last few
decades due to the rise in risks to networked systems.
سؤال
Detecting and reacting to incidents is not a function of IT security
management.
سؤال
Because the responsibility for IT security is shared across the
organization,there is a risk of inconsistent implementation of security and a loss of central monitoring and control.
سؤال
One asset may have multiple threats and a single threat may target
multiple assets.
سؤال
A major disadvantage of the baseline risk assessment approach is the
significant cost in time,resources,and expertise needed to perform
the analysis.
سؤال
Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.

A)act
B)plan
C)check
D)do
سؤال
Legal and regulatory constraints may require specific approaches to
risk assessment.
سؤال
The ________ has revised and consolidated a number of national and international standards into a consensus of best practice.

A)ISO
B)CSI
C)VSB
D)DBI
سؤال
The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A)risk register
B)corporate security policy
C)vulnerability source
D)threat assessment
سؤال
Establishing security policy,objectives,processes and procedures is part of the ______ step.

A)plan
B)check
C)act
D)none of the above
سؤال
ISO details a model process for managing information security that comprises the following steps: plan,do,________,and act.
سؤال
_________ is a process used to achieve and maintain appropriate levels of confidentiality,integrity,availability,accountability,authenticity,and reliability.
سؤال
The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.

A)combined
B)informal
C)baseline
D)detailed
سؤال
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.
سؤال
A(n)_________ is anything that has value to the organization.
سؤال
A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.

A)vulnerability
B)threat
C)risk
D)control
سؤال
The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach,detailed risk analysis,combined approach,and __________ approach.
سؤال
________ specification indicates the impact on the organization should the particular threat in question actually eventuate.

A)Risk
B)Consequence
C)Threat
D)Likelihood
سؤال
The term ________ refers to a document that details not only the overall security objectives and strategies,but also procedural policies that define acceptable behavior,expected practices,and responsibilities.
سؤال
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.
سؤال
The results of the risk analysis should be documented in a _________.

A)journal
B)consequence
C)risk register
D)none of the above
سؤال
The _________ approach involves conducting a risk analysis for the organization's IT systems that exploits the knowledge and expertise of the individuals performing the analysis.

A)baseline
B)combined
C)detailed
D)informal
سؤال
The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents,codes of practice,and industry best practice.
سؤال
The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.

A)establishing the context
B)control
C)risk avoidance
D)combining
سؤال
A(n)_________ is a weakness in an asset or group of assets that can be exploited by one or more threats.
سؤال
_________ include management,operational,and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.

A)Security controls
B)Risk appetite
C)Risk controls
D)None of the above
سؤال
The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.
سؤال
_________ is choosing to accept a risk level greater than normal for business reasons.

A)Risk avoidance
B)Reducing likelihood
C)Risk transfer
D)Risk acceptance
سؤال
Not proceeding with the activity or system that creates the risk is _________.
سؤال
The level of risk the organization views as acceptable is the organization's __________.
سؤال
The _________ provides the most accurate evaluation of an organization's IT system's security risks.
سؤال
_________ is sharing responsibility for the risk with a third party.
سؤال
The _________ approach combines elements of the baseline,informal,and detailed risk analysis approaches.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 14: It Security Management and Risk Assessment
1
Organizational security objectives identify what IT security outcomes
should be achieved.
True
2
It is not critical that an organization's IT security policy have full
approval or buy-in by senior management.
False
3
A threat may be either natural or human made and may be accidental
or deliberate.
True
4
Once the IT management process is in place and working the process
never needs to be repeated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
5
IT security management functions include:

A)determining organizational IT security objectives,strategies,and policies
B)detecting and reacting to incidents
C)specifying appropriate safeguards
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
6
IT security needs to be a key part of an organization's overall
management plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
7
__________ ensures that critical assets are sufficiently protected in a cost-effective manner.

A)IT control
B)IT security management
C)IT discipline
D)IT risk implementations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
8
Implementing the risk treatment plan is part of the ______ step.

A)check
B)act
C)do
D)plan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
9
IT security management consists of first determining a clear view of an
organization's IT security objectives and general risk profile.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
10
The assignment of responsibilities relating to the management of IT
security and the organizational infrastructure is not addressed in a
corporate security policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
11
Organizational security policies identify what needs to be done.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
12
A major advantage of the informal approach is that the individuals
performing the analysis require no additional skills.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
13
IT security management has evolved considerably over the last few
decades due to the rise in risks to networked systems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
14
Detecting and reacting to incidents is not a function of IT security
management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
15
Because the responsibility for IT security is shared across the
organization,there is a risk of inconsistent implementation of security and a loss of central monitoring and control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
16
One asset may have multiple threats and a single threat may target
multiple assets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
17
A major disadvantage of the baseline risk assessment approach is the
significant cost in time,resources,and expertise needed to perform
the analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
18
Maintaining and improving the information security risk management process in response to incidents is part of the _________ step.

A)act
B)plan
C)check
D)do
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
19
Legal and regulatory constraints may require specific approaches to
risk assessment.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
20
The ________ has revised and consolidated a number of national and international standards into a consensus of best practice.

A)ISO
B)CSI
C)VSB
D)DBI
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
21
The intent of the ________ is to provide a clear overview of how an organization's IT infrastructure supports its overall business objectives.

A)risk register
B)corporate security policy
C)vulnerability source
D)threat assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
22
Establishing security policy,objectives,processes and procedures is part of the ______ step.

A)plan
B)check
C)act
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
23
ISO details a model process for managing information security that comprises the following steps: plan,do,________,and act.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
24
_________ is a process used to achieve and maintain appropriate levels of confidentiality,integrity,availability,accountability,authenticity,and reliability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
25
The advantages of the _________ approach are that it doesn't require the expenditure of additional resources in conducting a more formal risk assessment and that the same measures can be replicated over a range of systems.

A)combined
B)informal
C)baseline
D)detailed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
26
The advantages of the _________ risk assessment approach are that it provides the most detailed examination of the security risks of an organization's IT system and produces strong justification for expenditure on the controls proposed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
27
A(n)_________ is anything that has value to the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
28
A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.

A)vulnerability
B)threat
C)risk
D)control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
29
The four approaches to identifying and mitigating risks to an organization's IT infrastructure are: baseline approach,detailed risk analysis,combined approach,and __________ approach.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
30
________ specification indicates the impact on the organization should the particular threat in question actually eventuate.

A)Risk
B)Consequence
C)Threat
D)Likelihood
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
31
The term ________ refers to a document that details not only the overall security objectives and strategies,but also procedural policies that define acceptable behavior,expected practices,and responsibilities.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
32
The aim of the _________ process is to provide management with the information necessary for them to make reasonable decisions on where available resources will be deployed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
33
The results of the risk analysis should be documented in a _________.

A)journal
B)consequence
C)risk register
D)none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
34
The _________ approach involves conducting a risk analysis for the organization's IT systems that exploits the knowledge and expertise of the individuals performing the analysis.

A)baseline
B)combined
C)detailed
D)informal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
35
The __________ approach to risk assessment aims to implement a basic general level of security controls on systems using baseline documents,codes of practice,and industry best practice.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
36
The purpose of ________ is to determine the basic parameters within which the risk assessment will be conducted and then to identify the assets to be examined.

A)establishing the context
B)control
C)risk avoidance
D)combining
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
37
A(n)_________ is a weakness in an asset or group of assets that can be exploited by one or more threats.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
38
_________ include management,operational,and technical processes and procedures that act to reduce the exposure of the organization to some risks by reducing the ability of a threat source to exploit some vulnerabilities.

A)Security controls
B)Risk appetite
C)Risk controls
D)None of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
39
The use of the _________ approach would generally be recommended for small to medium-sized organizations where the IT systems are not necessarily essential to meeting the organization's business objectives and additional expenditure on risk analysis cannot be justified.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
40
_________ is choosing to accept a risk level greater than normal for business reasons.

A)Risk avoidance
B)Reducing likelihood
C)Risk transfer
D)Risk acceptance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
41
Not proceeding with the activity or system that creates the risk is _________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
42
The level of risk the organization views as acceptable is the organization's __________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
43
The _________ provides the most accurate evaluation of an organization's IT system's security risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
44
_________ is sharing responsibility for the risk with a third party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
45
The _________ approach combines elements of the baseline,informal,and detailed risk analysis approaches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 45 في هذه المجموعة.