Current challenges in information security risk management

Current challenges in information security risk management

Assessment

Quiz

Professional Development

1st - 3rd Grade

Practice Problem

Hard

Used 13+ times

FREE Resource

Student preview

quiz-placeholder

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Who is ultimately responsible for managing information security risks?

End User

Information Owner

Chief Executive Officer

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To estimate the level of risk from a particular type of security breach, three factors are considered: threats, vulnerabilities, and impact.

An agent with the potential to CAUSE a security breach. This could be either a person or an environmental condition such as fire would be a(n)

Threat

Vulnerability

Impact

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scoping, identification of threats and compliance, validation of compliance and threats and calculating and reporting are the four steps of risk assessment. Which security risk management methodology has this steps?

FAIR

OCTAVE

ISAMM

CRAMM

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISF provides an Information Risk Analysis Methodology (IRAM) which focuses mainly on

The identification of infrastructure vulnerabilities

The reduction of risk impact, management of threats and counter-measures and legal or regulatory compliance.

The validation of compliance and threats

The determination of security requirements

All the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security controls may involve monetary costs, and may place other burdens on the organization – for example, requiring employees to wear ID badges.

TRUE

FALSE

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Given the following:

a.) The impact of a single laptop being lost or stolen is estimated at RM50,000.

b.) Because of inadequate security controls, it is estimated that three laptops will be lost or stolen per year.What is the annual loss expectancy from lost or stolen laptops?

RM 200,000

RM 150,000

RM 50,000

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

There are three types of information security threats: external threats, environmental or physical threats, and internal threats.


Intentional destruction of important data by a disgruntled employee is an

External Threat

Environmental or Physical Threat

Internal Threat

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?