Ask Computer Engineering Expert

1. What is the overall objective of an IT risk assessment?

a) To assist IT management in establishing a budget for countermeasures

b) To assist an organization in identifying risks and impacts

c) To convince the executive management on the importance of an Intrusion Detection System (IDF)

d) To determine which brand of firewall software to install on the CEO's laptop when traveling

2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure ?

a) It is difficult to setup the rules in a firewall based on quantitative statistics and numbers

b) A quantitative analysis is subjective and is based on the opinions of experts which is time consuming to collect

c) A quantitative analysis requires IBM's SPSS statistical software which is $2500 per copy and is too expensive

d) Obtaining the correct information on liabilities and collecting accurate data cost elements is difficult and time consuming

3. What would be a valid reason to assign a "1 - CRITICAL" risk factor to a found vulnerability?

a) It was determined that the vulnerability could cause employees to open emails with a possible virus.

b) It was determined that the vulnerability could impact the time it would take to stock incoming parts in the warehouse.

c) It was determined that the vulnerability could be the greatest risk to the organization

d) It was determined that the vulnerability could close the factory for a couple of hours.

4. Three vulnerabilities were determined for an organization:

Employee Productivity

Compliance shortcomings

Vulnerability in protecting Intellectual Property

You are about to assign Risk factors "1" , "2" , and "3" to these vulnerabilities to present to management. How would you prioritize these risks ?

a) 1- Keeping Employee Productivity up is the most serious risk, then 2-Compliance, then 3- Intellectual Property

b) 1- Protecting Intellectual Property is the most serious risk, then 2-Employee Productivity, then 3- Compliance

c) 1-Compliance is the most serious risk, then 2-Intellectual Property, then 3-Employee Productivity

d) All three are equally important and should have equal rating factors.

5) A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin having an affair. The affair carries on openly in the workplace over the course of 6 months, then begins to sour when she discovers that he is already married. The relationship quickly changes to bickering and name-calling while at work. The woman eventually breaks off the relationship, quits her job, and sues the company for fostering a hostile work environment. True or False: Of the seven IT infrastructure domains, the USER domain was most at risk.

a) True

b) False

6) A young woman waits in a local deli to hear the coffee order come in by phone from the law firm close by. The law firm places the same order every morning. A delivery boy sets out to deliver the coffee but is met outside by the woman near the front of the firm's building. The woman smiles and claims she is one of the lawyers; she offers to bring the coffee upstairs for him and gives him a generous $10 tip. The boy shrugs, takes the money, gives her the coffee order, and heads back to the deli.

The woman enters the firm's lobby and tells the two security guards that she is the delivery girl from the deli and has the coffee order. She chats casually with one guard while she covertly peers over the shoulder of the 2nd guard and watches him enter the security codes to access the elevators on the lobby computer. The first guard takes the coffee and gives her a $2 tip. She gives them a big, friendly smile, says thank you, waves goodbye, and leaves the building.

10 days later she returns to the law firm at night, breaks into the building, accesses the elevators using the lobby computer, and breaks into the offices upstairs to steal vital case information.

Which domain was exploited by the woman perpetrator ?

a) The LAN domain

b) The User domain and the Remote Access domain

c) The Workstation domain

d) The System/Application domain

7) A pharmaceutical sales person has a route of doctor's offices that he visits to see if they need to replenish any of the drug supplies in the offices. He carries with him a tablet with a cellular data plan from which he can place orders. The transactions are processed in real-time via secure browser over the Internet to access the sales-order entry system. Which of the seven domains would have the primary focus of secure communications?

a) The User domain and Systems/Application domain

b) The WAN domain and the Systems/Application domain

c) The LAN-to-WAN doman

d) The Remote Access domain

8) Which of the threats below is primarily a risk to the Systems/Application domain ?

a) A fire destroys the primary data center

b) There is a major network outage

c) A hacker accesses the internal network from a public Internet cafe.

d) None of the above

9) Which of the following is NOT a LAN-to-WAN domain risk ?

a) VPN tunnel hardware is obsolete and needs upgrading to modern security levels

b) Weak ingress & egress traffic filtering between the internal network and the Internet

c) DDoS attack on DMZ and email server

d) Unauthorized access to business-owned workstations

10) Loss of production data is a Workstation domain risk.

a) True

b) False

11) Network performance that is slowed down by excessive Internet traffic is a top-level (1-rating) critical business risk ?

a) True

b) False

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92550626
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As