Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. What is the goal or objective of an IT risk management plan?

A) To determine the cost of implementing countermeasures.

B) To analyze hacker threats to match those threats to found system vulnerabilities.

C) To assist organizations in handling risk management for their IT infrastructure and treat all unknown risks.

D) To automatically shut down Internet access if hacking activity is discovered in real-time.

2. Which of the choices below are NOT one of the five fundamental components of an IT risk management plan?

A) Risk assessment

B) Risk discovery

C) Risk assessment

D) Risk monitoring

3. Risk planning is...

A) The process of using the cost-benefit analysis formulas to determine the greatest risk.

B) The process of analyzing the impact of storm damage on a facility.

C) The process of anticipating risk assessment costs.

D) The process of organizing how to conduct risk management

4. Which step is to be done first in performing risk management:

A) Risk identification

B) Risk assessment

C) Risk response such as avoidance

D) Risk planning

5. Which choice below indicates the action of measuring or determining how significant a risk is?

A) Risk mitigation

B) Risk assessment

C) Risk transfer

D) Cost Benefit Analysis

6. Which practice helps address risks?

A) Risk assessment

B) Risk deployment

C) Risk response

D) Risk avoidance

7. What ongoing practice helps track risk in real time?

A) Risk monitoring

C) Confidentiality, integrity, and availability

E) Risk assessment

D) Risk determinant

8. True or False: Once all of the steps in risk management are completed (identification, assessment, response, monitoring) the task of risk management is finished.

A) True

B) False

9. Why is it a good idea to establish a risk management plan team?

A) Because the team will be instrumental in completing the cost benefit analysis

B) Because the team will be needed to convince the executive management to complete the risk management assessment.

C) Because a team is needed to maintain momentum and keep the company excited about completing the risk management plan.

D) Because the team must be able to cover all of the IT domains. The scope and boundary of an IT risk management plan can be very large.

10. Of the 7 IT domains, which domain is the most difficult to identify, assess, and monitor risk in?

A) Workstation domain

B) User domain

C) WAN domain

D) Systems/Applications domain

11. In the lab work, how did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities help your IT risk management plan outline?

A) Because the textbook tracts along with the lab manual

B) Because the table in step 13 pointed out 21 risks, threats, and vulnerabilities which identified risk and their impacts. Risk response must focus on immediate action where needed, followed by a plan for ongoing response.

C) Because risk response is based on the findings from vulnerability analysis in the last chapter.

D) It was no help. There is no correlation.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92534198
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question suppose message a is one block long suppose that

Question : Suppose message (a) is one block long. Suppose that an attacker has received the MAC (t) for a using CBC-MAC under some random key unknown to the attacker. Explain how to forge the MAC for a two-block message ...

The cost of a new piece of equipment is 42000 it is

The cost of a new piece of equipment is $42000. It is expected that the new piece of equipment will lead to cash flows of $17000, $29000, and $40000 over the next three years. Discount rate is 12% what is the net present ...

Question suppose we run dfs on a undirected graph g that

Question : Suppose we run DFS on a (undirected) graph G that has edge weights and is connected (there is a path connecting any two vertices of G). (a) Prove that the DFS tree is a spanning tree of G. (b) Recall that the ...

Systems analysis projectpersonal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Truefalse questions no explanation is neededa on a

True/False Questions (NO explanation is needed): (a) On a Windows-based laptop computer the SECURITY registry file maintains a list of the host computer's wireless connections. (b) IEEE 802.11 Security Standard WEP (Wire ...

Systems analysis project 5can you answer the 4questions

Systems Analysis project 5: Can you answer the 4questions please. Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an internat ...

When you respond to others discuss ways in which technology

When you respond to others, discuss ways in which technology has changed your outlook on your career of choice.

How can word processing software give a person the ability

How can Word Processing software give a person the ability to better position themself or a business, in today's society? Why?

Sum of consecutive integersa write a program that prompts

Sum of consecutive integers A) Write a program that prompts for an integer-let's call it X-and then finds the sum of X consecutive integers starting at 1. That is, if X = 5, you will find the sum of1+2+3+4+5=15 B) Modify ...

Wat are three 3 major categories of cyber terrorism and

What are three (3) major categories of cyber terrorism and / or information warfare. Among the chosen categories, determine the one (1) that should be the top priority for the federal government to address.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As