Current challenges in information security risk management

Current challenges in information security risk management

Assessment

Quiz

Professional Development

1st - 3rd Grade

Hard

Used 13+ times

FREE Resource

Student preview

quiz-placeholder

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Who is ultimately responsible for managing information security risks?

End User

Information Owner

Chief Executive Officer

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

To estimate the level of risk from a particular type of security breach, three factors are considered: threats, vulnerabilities, and impact.

An agent with the potential to CAUSE a security breach. This could be either a person or an environmental condition such as fire would be a(n)

Threat

Vulnerability

Impact

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Scoping, identification of threats and compliance, validation of compliance and threats and calculating and reporting are the four steps of risk assessment. Which security risk management methodology has this steps?

FAIR

OCTAVE

ISAMM

CRAMM

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISF provides an Information Risk Analysis Methodology (IRAM) which focuses mainly on

The identification of infrastructure vulnerabilities

The reduction of risk impact, management of threats and counter-measures and legal or regulatory compliance.

The validation of compliance and threats

The determination of security requirements

All the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security controls may involve monetary costs, and may place other burdens on the organization – for example, requiring employees to wear ID badges.

TRUE

FALSE

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Given the following:

a.) The impact of a single laptop being lost or stolen is estimated at RM50,000.

b.) Because of inadequate security controls, it is estimated that three laptops will be lost or stolen per year.What is the annual loss expectancy from lost or stolen laptops?

RM 200,000

RM 150,000

RM 50,000

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

There are three types of information security threats: external threats, environmental or physical threats, and internal threats.


Intentional destruction of important data by a disgruntled employee is an

External Threat

Environmental or Physical Threat

Internal Threat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?