Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment

1. Why is a risk assessment valuable for an organization?

a. Helps protect assets
b. Helps plan employee vacation timing
c. Identifies future capital investments
d. Helps protect management

2. Which of the following is not a component of the risk assessment process?

a. Risk identification
b. Risk likelihood
c. Risk elimination
d. Risk prioritization

3. Which of the following is a type of risk assessment?

a. Monitoring
b. Quantity
c. Processing
d. Qualitative

4. What type of risk assessment uses monetary values to assess a risk?

a. Quantitative
b. Qualitative
c. Ongoing
d. Subjective

5. What type of risk assessment uses terms such as ALE, SLE, and ARO?

a. Delphi
b. Risk Matrix
c. Quantitative
d. Qualitative

6. You are analyzing a risk and have determined that the SLE is $1,500 and the ARO is 5. What is the ALE?

a. Unable to determine with information given
b. $300
c. $7,500
d. $90,000

7. A company issues laptop computers to 100 employees. The value of each laptop including hardware, software, and data is $1,000. On average, employees lose one laptop a month. What is the SLE?

a. 12
b. 100
c. $1,000
d. $12,000

8. A company issues laptop computers to 100 employees. The value of each laptop including hardware, software, and data is $1,000. On average, employees lose one laptop a month. What is the ARO?

a. 12
b. 100
c. $1,000
d. $12,000

9. A company issues laptop computers to 100 employees. The value of each laptop including hardware, software, and data is $1,000. On average, employees lose one laptop a month. Management determines that it can purchase hardware locks for a total of $1,000 and reduce the number of lost laptops to one per year. Should they purchase the locks?

a. Yes, because the savings is greater than the cost of the control.
b. Yes, because the cost of the control is greater than the savings.
c. No, because the savings is greater than the cost of the control.
d. No, because the cost of the control is greater than the savings.

10. Senior management has recently reviewed an RA but chose not to accept any of the recommendations. What risk management strategy are they using?

a. Risk mitigation
b. Profitability
c. Survivability
d. Risk acceptance

Scenario:
In order to help make better decisions regarding risk assessment data, senior management at YieldMore has requested quantitative information relating to key information technology (IT) assets.

Tasks:

You, as an employee of YieldMore, have been given a task of providing quantitative risk assessment information to senior management.

1. Estimate the value of at least five key IT assets in the organization.

2. Be sure you consider direct and indirect financial and business impact of the IT assets.

3. Calculate the single loss expectancy (SLE) of the IT assets. (For this exercise, you will need to estimate this value.)

4. Calculate the annual rate of occurrence (ARO) for risk associated with the IT assets. (For this exercise, you will need to estimate this value.)

5. Calculate the annual loss expectancy (ALE) of the IT assets.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92481647
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

1 discuss the difference between a business continuity plan

1. Discuss the difference between a Business Continuity Plan (BCP), and a Disaster Recovery Plan (DRP). 2. What would be your recommendation for training personnel on your BCP and DRP if your plan documents were adopted ...

Hill-rom was transforming from its traditional lines of

Hill-Rom was transforming from its traditional lines of business to a company that was leveraging data to ensure patient safety and satisfaction. 1-How does the HILL-TOM transformation journey change the way the company ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) Discuss the following working with data steps: Data acquisition, data examination, data transformatio ...

Research projecton march 11th 2011 stackoverflow made a

Research Project On March 11th, 2011, StackOverflow made a significant change to their leaderboard. They now show users with top reputation gained in the past week, rather than all-time high reputation users. The rationa ...

Assignment application perform data gathering and

Assignment Application: Perform Data Gathering and Footprinting on a Targeted Website You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet ...

Assessment instructionsfirst select a global it

Assessment Instructions First, select a global IT organization with which you are currently affiliated or have worked for in the past, or one you would like to learn more about. This organization should be relevant to yo ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

Case study 1read the article in the attachmentan overview

Case Study 1 Read the Article in the attachment An overview of cyber-attack and computer network operations simulation Write a four to five (4-5) page paper in which you: Identify at least three (3) benefits or key knowl ...

Ransomware to pay or not to pay when it comes to

Ransomware: To pay or not to pay? When it comes to corporate data, should corporations pay? Can you trust paying? What can be done to protect against ransomware? Would you pay if it were your own personal data? How can y ...

Systems analysis design uml version 20 4th edition textbook

Systems Analysis Design UML Version 2.0 4th Edition textbook (Your Turn 8-2) Create a set of discussion points that you will use to explain to your development team the importance of optimizing the design before jumping ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As