Search Header Logo
DSM2504(4) DIAGNOSING VULNERABILITIES

DSM2504(4) DIAGNOSING VULNERABILITIES

Assessment

Presentation

•

Social Studies

•

University

•

Medium

Created by

Nur Fatima Aisya Jamil

Used 1+ times

FREE Resource

16 Slides • 17 Questions

1

media

2

media

3

media

4

media

5

Reorder

Reorder the following crisis preparation steps

Vulnerabilities

Crisis types

Crisis Management Team (CMT)

Spokesperson

Crisis Management Plan (CMP)

1
2
3
4
5

6

media

7

Multiple Choice

Which is NOT true about crisis vulnerabilities?

1

Extension of signal detection

2

Based on location and type of organisation

3

Uses issues management

4

Reviewed by risk committee

8

media

9

Reorder

Reorder the following Risk Assessment based on ISO 31000

Risk identification

Risk analysis

Risk evaluation

1
2
3

10

Multiple Choice

Which Enterprise Security Risk Management (ESRM) step refers to diagnosing vulnerabilities?

1

Identify & prioritise asset

2

Identify & prioritise risk

3

Mitigate prioritised risk

4

Improve & advance

11

media

12

Multiple Choice

According to ISO31000, risk assessment is ...

1

Characteristics of effective and efficient risk management

2

Integrating risk management into activities and functions

3

Reducing organisational vulnerabilities

4

Overall process of risk identification, analysis, and evaluation

13

Match

Match the following risk assessment process

Find, recognize and describe risks

Comprehend risk nature and characteristics

Support decisions

identification

analysis

evaluation

14

Match

Match the following risk assessment process

Most common natural disaster is flood

Flood is likely to happen but there are few negative impacts

Deciding to do nothing about flood

identification

analysis

evaluation

15

media

16

media

17

Multiple Choice

All risk triangle elements must be present for threat to be considered a risk

1

True

2

False

18

Match

Match the following risk triangle

something threatening asset

threat level happening to asset

consequence of threat happening

threat

exposure

impact

19

Match

Match the following risk triangle

Data being hacked

No antivirus installed

Loss of data

threat

exposure

impact

20

media

21

media

22

Match

Match the following risk identification techniques

Systematic Literature Review on police culture

Research on police stress factors

Economist claims corruption among police is due to low wage

Evidence

Empirical

Perception survey

23

Match

Match the following risk identification techniques

SWIFT

scenario analysis

SWOT

Smaller element

Imaginative thinking

Checklist

24

media

25

Multiple Choice

According to IEC31010:2019, risk register is ...

1

Combination of risk information to inform those exposed and have responsibility to manage it

2

Risk with range of consequence values, displayed as a probability

distribution of consequences (PDF)

3

Combination of likelihood and consequence for risk prioritisation

4

Graphical depiction of pathways from causes to consequences of events

26

Multiple Choice

Which is NOT a risk register component?

1

Responsibility

2

Likelihood

3

Causes

4

Control

27

media

28

media

29

media

30

Multiple Choice

According to IEC31010:2019, risk matrix is ...

1

Combination of risk information to inform those exposed and have responsibility to manage it

2

Risk with range of consequence values, displayed as a probability

distribution of consequences (PDF)

3

Combination of likelihood and consequence for risk prioritisation

4

Graphical depiction of pathways from causes to consequences of events

31

Multiple Choice

According to the risk matrix, what number point scales are most common?

1

3

2

4

3

5

4

7

32

Match

Match the following risk matrix

4 people had died during Shah Alam's devastating flood in 2021

Flooding happens every end of the year due to the monsoon season

The most significant risk is flooding

Consequence

Likelihood

Priority rating

33

media
media

Show answer

Auto Play

Slide 1 / 33

SLIDE