Quiz: Module 15 Information Security Management

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

Which of the following threats would be classified as the actions of a hacktivist?

a. external threat

b. internal threat

c. environmental threat

d. compliance threat

a. external threat

2
New cards

Which of these is NOT a response to risk?

a. mitigate

b. accept

c. resist

d. avoid

c. resist

3
New cards

Which of the following is NOT a threat classification category?

a. compliance

b. financial

c. tactical

d. strategic

c. tactical

4
New cards

In which of the following threat classifications would a power blackout be classified?

a. operational

b. managerial

c. technical

d. strategic

a. operational

5
New cards

Which of the following approaches to risk calculation typically assigns a numeric value (1–10) or label (High, Medium, or Low) to represent a risk?

a. quantitative

b. qualitative

c. rule based

d. policy based

b. qualitative

6
New cards

What is a list of potential threats and associated risks called?

a. risk assessment

b. risk matrix

c. risk register

d. risk portfolio

c. risk register

7
New cards

Giovanni is completing a report on risks. To which risk option would he classify the action that the organization has decided not to construct a new data center because it would be located in an earthquake zone?

a. transfer

b. avoid

c. reject

d. prevent

b. avoid

8
New cards

Aristide is explaining to a coworker the new cybersecurity asset management (CAM) system. Which of the following would he NOT say about a CAM?

a. It is a relatively new process that combines asset management with information security.

b. It can identify assets on a continuous and real-time basis.

c. It can use vulnerability scanners.

d. It is designed to replace asset management.

d. It is designed to replace asset management.

9
New cards

Emiliano needs to determine the expected monetary loss every time a risk occurs. Which formula will he use?

a. AV

b. SLE

c. ARO

d. ALE

b. SLE

10
New cards

Enzo is reviewing asset tracking for a certification exam. Which of the following is NOT true about asset tracking?

a. Asset tracking can be used to determine when assets should be upgraded, replaced, or disposed.

b. Asset tracking can help determine what assets add value.

c. Asset tracking is part of an asset management system.

d. Asset tracking traces the location of intangible assets.

d. Asset tracking traces the location of intangible assets.

11
New cards

Which of the following is a listing of assets by a seller of those assets?

a. asset enumeration

b. asset inventory

c. asset counting

d. asset verification

a. asset enumeration

12
New cards

Which of the following is NOT a legally enforceable agreement but is still more formal than an unwritten agreement?

a. BPA

b. SLA

c. MOU

d. AMS

c. MOU

13
New cards

Angelo has received a document that is part of a contract that describes the work requirements for a specific project. What type of document is this?

a. EOA

b. BPP

c. SOW

d. EOS

c. SOW

14
New cards

Which of the following uses scientific tools to determine the amount of variation that is added to a process?

a. XRS

b. MSA

c. RAR

d. PDP

b. MSA

15
New cards

Which of the following risk management strategies utilizes cybersecurity insurance?

a. accept

b. transfer

c. mitigate

d. change

b. transfer

16
New cards

Which of the following is NOT a third-party risk?

a. on-boarding

b. social media network sharing

c. risk awareness

d. network assignment

d. network assignment

17
New cards

Sergio has been asked to provide historical data for calculating the likelihood of a risk. Which of the following data sets would he NOT submit?

a. network packet analysis

b. law enforcement data

c. insurance company data

d. data from computer incident monitoring organizations

a. network packet analysis

18
New cards

Which of the following is used to minimize biases and prejudices regarding analyzing risks?

a. RCSA

b. RCA

c. SCRA

d. DOS

a. RCSA

19
New cards

Which of the following is NOT a standard operating procedure that can impact information security?

a. change in ownership or stakeholders

b. implement impact analysis or test results

c. execute backout plan or maintenance window

d. change allow lists/deny lists

d. change allow lists/deny lists

20
New cards

Gabe is creating a report for his supervisor Cora that outlines the total risk that the organization can bear in a given risk profile. Which of the following terms would Gabe be using?

a. risk tolerance

b. risk appetite

c. risk expansion

d. risk acceptance

c. risk expansion