Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 5: Risk Management
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
The results from risk assessment activities can be delivered in a number of ways: a report on a systematic approach to risk control, a project-based risk assessment, or a topic-specific risk assessment.
Question 22
True/False
Each of the threats faced by an organization must be evaluated, including determining the threat's potential to endanger the organization, which is known as a threat
prioritization
. _________________________
Question 23
True/False
Process-based measures are performance measures that are focused on numbers and are less strategic than metric-based measures.
Question 24
True/False
One way to determine which information assets are valuable is by evaluating which information asset(s) would expose the company to liability or
embarrassment
if revealed. _________________________
Question 25
True/False
Risk
acceptance
defines the quantity and nature of risk that organizations are willing to accept as they evaluate the trade-offs between perfect security and unlimited accessibility. _________________________
Question 26
True/False
Likelihood is the probability that a specific vulnerability within an organization will be the target of an attack. _________________________
Question 27
True/False
A best practice proposed for a small to medium-sized business will be similar to one used to help design control strategies for a large multinational company.
Question 28
True/False
Cost-benefit analyses (CBAs) cannot be calculated after controls have been functioning for a time, as observation over time prevents precision in evaluating the benefits of the safeguard and determining whether it is functioning as intended.