Matching
Match each item with an statement below:
Premises:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Responses:
Exposure Factor (EF)
Attack tree
Acceptable use policy (AUP)
Annualized Rate of Occurrence (ARO)
Security policy
Code of ethics
Risk assessment
Data
Security policy cycle
Correct Answer:
Premises:
Responses:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Premises:
never-ending process of identifying what needs to be protected, determining how to protect it, and evaluating the adequacy of the protection.
defines what actions the users of a system may perform while using the wireless network.
probability that a risk will occur in a particular year.
final step in identifying risks.
the lifeblood of an organization.
encourage members of professional groups to adhere to strict ethical behavior within their profession.
document that outlines the specific rules that must be met in order to keep the WLAN secure.
a valuable tool used in threat modeling.
proportion of an asset's value that is likely to be destroyed by a particular risk.
Responses:
Related Questions
Q32: The SLE is computed by multiplying the
Q33: Managing the process of implementing changes is
Q34: Only that employee whose job function depends
Q35: What are the types of assets available
Q36: A(n) _ is a document or series
Q37: Briefly explain how to perform a risk
Q38: What are some of the factors to
Q39: A(n) _ outlines the actions to be
Q40: What are some of the principles that
Q41: Briefly describe the areas that should be
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents