
Current challenges in information security risk management

Quiz
•
Professional Development
•
1st - 3rd Grade
•
Hard
Used 13+ times
FREE Resource
Student preview

12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Who is ultimately responsible for managing information security risks?
End User
Information Owner
Chief Executive Officer
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
To estimate the level of risk from a particular type of security breach, three factors are considered: threats, vulnerabilities, and impact.
An agent with the potential to CAUSE a security breach. This could be either a person or an environmental condition such as fire would be a(n)
Threat
Vulnerability
Impact
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Scoping, identification of threats and compliance, validation of compliance and threats and calculating and reporting are the four steps of risk assessment. Which security risk management methodology has this steps?
FAIR
OCTAVE
ISAMM
CRAMM
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ISF provides an Information Risk Analysis Methodology (IRAM) which focuses mainly on
The identification of infrastructure vulnerabilities
The reduction of risk impact, management of threats and counter-measures and legal or regulatory compliance.
The validation of compliance and threats
The determination of security requirements
All the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security controls may involve monetary costs, and may place other burdens on the organization – for example, requiring employees to wear ID badges.
TRUE
FALSE
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Given the following:
a.) The impact of a single laptop being lost or stolen is estimated at RM50,000.
b.) Because of inadequate security controls, it is estimated that three laptops will be lost or stolen per year.What is the annual loss expectancy from lost or stolen laptops?
RM 200,000
RM 150,000
RM 50,000
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
There are three types of information security threats: external threats, environmental or physical threats, and internal threats.
Intentional destruction of important data by a disgruntled employee is an
External Threat
Environmental or Physical Threat
Internal Threat
Create a free account and access millions of resources
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade