Ask Risk Management Expert

Assignment

Question 1
What should you be armed with to adequately assess potential weaknesses in each information asset?
Intellectual property assessment
Properly classified inventory
List of known threats
Audited accounting spreadsheet

Question 2
Which of the following is a network device attribute that may be used in conjunction with DHCP, making asset-identification using this attribute difficult?
IP address
Part number
MAC address
Serial number

Question 3
Which of the following is NOT a valid rule of thumb on risk control strategy selection?
When the attacker's potential gain is less than the costs of attack: Apply protections to decrease the attacker's cost or reduce the attacker's gain, by using technical or operational controls.
When a vulnerability can be exploited: Apply layered protections, architectural designs, and administrative controls to minimize the risk or prevent the occurrence of an attack.
When the potential loss is substantial: Apply design principles, architectural designs, and technical and non-technical protections to limit the extent of the attack, thereby reducing the potential for loss.
When a vulnerability exists: Implement security controls to reduce the likelihood of a vulnerability being exploited.

Question 4
By multiplying the asset value by the exposure factor, you can calculate which of the following?
Value to adversaries
Annualized cost of the safeguard
Annualized loss expectancy
Single loss expectancy

Question 5
The Microsoft Risk Management Approach includes four phases. Which of the following is NOT one of them?
Implementing controls
Evaluating alternative strategies
Conducting decision support
Measuring program effectiveness

Question 6
What does FAIR rely on to build the risk management framework that is unlike many other risk management frameworks?
Qualitative assessment of many risk components
Quantitative valuation of safeguards
Subjective prioritization of controls
Risk analysis estimates

Question 7
Which of the following affects the cost of a control?
Maintenance
Liability insurance
CBA report
Asset resale

Question 8
Strategies to limit losses before and during a realized adverse event is covered by which of the following plans in the mitigation control approach?
Disaster recovery plan
Business continuity plan
Damage control plan
Incident response plan

Question 9
The identification and assessment of levels of risk in an organization describes which of the following?
Risk reduction
Risk management
Risk identification
Risk analysis

Question 10
Determining the cost of recovery from an attack is one calculation that must be made to identify risk, what is another?
Cost of prevention
Cost of identification
Cost of litigation
Cost of detection

Question 11
Which of the following provides an identification card of sorts to clients who request services in a Kerberos system?
Ticket Granting Service
Authentication Server
Authentication Client
Key Distribution Center

Question 12
Which of the following is a commonly used criteria used to compare and evaluate biometric technologies?
False accept rate
False reject rate
Crossover error rate
Valid accept rate

Question 13
To move the InfoSec discipline forward, organizations should take all but which of the following steps?
Learn more about the requirements and qualifications for InfoSec and IT positions
Learn more about InfoSec budgetary and personnel needs
Insist all mid-level and upper-level management take introductory InfoSec courses
Grant the InfoSec function an appropriate level of influence and prestige

Question 14
Which of the following InfoSec positions is responsible for the day-to-day operation of the InfoSec program?
Security technician
Security officer
Security manager
CISO

Question 15
The intermediate area between trusted and untrusted networks is referred to as which of the following?
Demilitarized zone
Unfiltered area
Proxy zone
Semi-trusted area

Question 16
Which technology has two modes of operation: transport and tunnel?
Secure Sockets Layer
Secure Hypertext Transfer Protocol
Secure Shell
IP Security

Question 17
Which of the following is NOT a typical task performed by the security technician?
Develop security policy
Coordinate with systems and network administrators
Configure firewalls and IDPSs
Implement advanced security appliances

Question 18
Temporary hires called contract employees - or simply contractors - should not be allowed to do what?
Work on the premises
Wander freely in and out of buildings
Compensated by the organization based on hourly rates
Visit the facility without specific, prior coordination

Question 19
Which tool can best identify active computers on a network?
Packet sniffer
Port scanner
Honey pot
Trap and trace

Question 20
Which of the following is typically true about the CISO position?
Accountable for the day-to-day operation of all or part of the InfoSec program
Frequently reports directly to the Chief Executive Officer
Technically qualified individual who may configure firewalls and IDPSs
Business managers first and technologists second

Previous PageNext Page
Question 21
The penalties for offenses related to the National Information Infrastructure Protection Act of 1996 depend on whether the offense is judged to have been committed for one of the following reasons except which of the following?
For political advantage
For private financial gain
In furtherance of a criminal act
For purposes of commercial advantage

Question 22
There are three general categories of unethical behavior that organizations and society should seek to eliminate. Which of the following is NOT one of them?
Intent
Accident
Ignorance
Malice

Question 23
Which of the following is the best method for preventing an illegal or unethical activity? Examples include laws, policies and technical controls.
Persecution
Remediation
Rehabilitation
Deterrence

Question 24
Which of the following is an international effort to reduce the impact of copyright, trademark and privacy infringement, especially via the removal of technological copyright protection measures?
DMCA
European Council Cybercrime Convention
U.S. Copyright Law
PCI DSS

Question 25
Which of the following ethical frameworks is the study of the choices that have been made by individuals in the past; attempting to answer the question, what do others think is right?
Descriptive ethics
Normative ethics
Deontological ethics
Applied ethics

Question 26
Deterrence is the best method for preventing an illegal or unethical activity.
True
False

Question 27
Which law requires mandatory periodic training in computer security awareness and accepted computer security practice for all employees who are involved with the management, use, or operation of each federal computer system?
The Telecommunications Deregulation and Competition Act
National Information Infrastructure Protection Act
The Computer Security Act
Computer Fraud and Abuse Act

Question 28
Which of the following is compensation for a wrong committed by an employee acting with or without authorization?
Jurisdiction
Due diligence
Liability
Restitution

Question 29
The Secret Service is charged with the detection and arrest of any person committing a U.S. federal offense relating to computer fraud, as well as false identification crimes.
True
False

Question 30
Which entity is not exempt from the Federal Privacy Act of 1974?
U.S. Congress
Hospitals
Credit agencies
Bureau of the Census.

Risk Management, Finance

  • Category:- Risk Management
  • Reference No.:- M92422139
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Risk Management

Respond to the following scenario with your thoughts ideas

Respond to the following scenario with your thoughts, ideas, and comments. Be substantive and clear, and use research to reinforce your ideas. Apix is considering coffee packaging as an additional diversification to its ...

Financial derivatives and risk management homework -1 this

Financial Derivatives and Risk Management Homework - 1. This is September, and you have $4,000 to invest for three months. The stock price is currently $40. A December call option with a $40 strike price is currently sel ...

Students will be randomly allocated to bushfire disaster

Students will be randomly allocated to Bushfire disaster scenarios and asked to complete a disaster response plan. The plan must cover all the relevant elements described in the unit and be an appropriate response for th ...

Advanced project risk management assignment -aim the aim of

Advanced Project Risk Management Assignment - Aim: The aim of this assignment is to: demonstrate the understanding of Decision Tree/Expected Monetary Value and the use of the software Precision Tree schedule a project us ...

Problem 1ben traders a privately held us metals broker has

Problem 1: Ben Traders, a privately held U.S. metals broker, has acquired an option to purchase one million kilograms of partially refined molyzirconium ore from the Zeldavian government for $5.00 per kilogram. Molyzirco ...

Problem 1how much will an employees portfolio be worth

Problem 1: How much will an employee's portfolio be worth after working for the company 30 years more? The Human Resource department at EcoCarnifex Corporation was asked to develop a financial planning model that would h ...

Safety and risk management are critical aspects of a

Safety and Risk Management are critical aspects of a workplace and breaches are punishable under Work Health and Safety Law. This task encourages students to analyse and conceptualise responses to safety breaches in a gi ...

Problem 1 you are the mechanical engineer in charge of

Problem 1: You are the mechanical engineer in charge of maintaining the machines in a factory. The plant manager has asked you to evaluate a proposal to replace the current machines with new ones. The old and new machine ...

Financial risk management assignment - part a - part a

FINANCIAL RISK MANAGEMENT ASSIGNMENT - Part A - Part A requires you to complete the modules of "Economic Indicators" and "Fixed Income" of Bloomberg Market Concepts (BMC), which takes about 4 hours (1 hour for "Economic ...

Question - for a western business of your choice please let

Question - For a western business of your choice, (please let me know what you chose) Briefly describe the business, scan the environment, and list one risk you've identified to implement an ERM. Describe the risks and e ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As