A. Software products
B. Internet connections
C. Security policies
D. Humans
Answer: D
Regardless of the specifics of a security solution, humans are the weakest element.
A. Create a job description.
B. Set position classification.
C. Screen candidates.
D. Request resumes.
Answer: A
The first step in hiring new employees is to create a job description. Without a job description, there is no consensus on what type of individual needs to be found and hired.
A. To return the exiting employee’s personal belongings
B. To review the nondisclosure agreement
C. To evaluate the exiting employee’s performance
D. To cancel the exiting employee’s network access accounts
Answer: B
The primary purpose of an exit interview is to review the nondisclosure agreement (NDA) and other liabilities and restrictions placed on the former employee based on the employment agreement and any other security-related documentation.
A. Inform the employee a few hours before they are officially terminated.
B. Disable the employee’s network access just as they are informed of the termination.
C. Send out a broadcast email informing everyone that a specific employee is to be terminated.
D. Wait until you and the employee are the only people remaining in the building before announcing the termination.
Answer: B
You should remove or disable the employee’s network user account immediately before or at the same time they are informed of their termination.
A. Asset identification
B. Third-party governance
C. Exit interview
D. Qualitative analysis
Answer: B
Third-party governance is the application of security oversight on third parties that your organization relies on.
A. Hybrid assessment
B. Risk aversion process
C. Countermeasure selection
D. Documentation review
Answer: D
A portion of the documentation review is the logical and practical investigation of business processes and organizational policies.
A. IT security can provide protection only against logical or technical attacks.
B. The process by which the goals of risk management are achieved is known as risk analysis.
C. Risks to an IT infrastructure are all computer based.
D. An asset is anything used in a business process or task.
Answer: C
Risks to an IT infrastructure are not all computer based. In fact, many risks come from noncomputer sources. It is important to consider all possible risks when performing risk evaluation for an organization. Failing to properly evaluate and respond to all forms of risk, a company remains vulnerable.
A. Analyzing an environment for risks
B. Creating a cost/benefit report for safeguards to present to upper management
C. Selecting appropriate safeguards and implementing them
D. Evaluating each threat event as to its likelihood of occurring and cost of the resulting damage
Answer: C
Risk analysis includes analyzing an environment for risks, evaluating each threat event as to its likelihood of occurring and the cost of the damage it would cause, assessing the cost of various countermeasures for each risk, and creating a cost/benefit report for safeguards to present to upper management. Selecting safeguards is a task of upper management based on the results of risk analysis. It is a task that falls under risk management, but it is not part of the risk analysis process.
A. A development process
B. An IT infrastructure
C. A proprietary system resource
D. Users’ personal files
Answer: D
The personal files of users are not usually considered assets of the organization and thus are not considered in a risk analysis.
A. Threat events
B. Risks
C. Threat agents
D. Breaches
Answer: A
Threat events are accidental or intentional exploitations of vulnerabilities.
A. Vulnerability
B. Exposure
C. Risk
D. Penetration
Answer: A
A vulnerability is the absence or weakness of a safeguard or countermeasure.
A. An assessment of probability, possibility, or chance
B. Anything that removes a vulnerability or protects against one or more specific threats
C. Risk = threat * vulnerability
D. Every instance of exposure
Answer: B
Anything that removes a vulnerability or protects against one or more specific threats is considered a safeguard or a countermeasure, not a risk.
A. The expected annual cost of asset loss should not exceed the annual costs of safeguards.
B. The annual costs of safeguards should equal the value of the asset.
C. The annual costs of safeguards should not exceed the expected annual cost of asset loss.
D. The annual costs of safeguards should not exceed 10 percent of the security budget.
Answer: C
The annual costs of safeguards should not exceed the expected annual cost of asset loss.
A. Threat + vulnerability
B. Asset value ($) * exposure factor
C. Annualized rate of occurrence * vulnerability
D. Annualized rate of occurrence * asset value * exposure factor
Answer: B
SLE is calculated using the formula SLE = asset value ($) * exposure factor (SLE = AV * EF).
A. ALE before safeguard - ALE after implementing the safeguard - annual cost of safeguard
B. ALE before safeguard * ARO of safeguard
C. ALE after implementing safeguard + annual cost of safeguard - controls gap
D. Total risk - controls gap
Answer: A
The value of a safeguard to an organization is calculated by ALE before safeguard – ALE after implementing the safeguard – annual cost of safeguard [(ALE1 – ALE2) – ACS].
A. Principle of least privilege
B. Job descriptions
C. Separation of duties
D. Qualitative risk analysis
Answer: C
The likelihood that a co-worker will be willing to collaborate on an illegal or abusive scheme is reduced because of the higher risk of detection created by the combination of separation of duties, restricted job responsibilities, and job rotation.
A. Education
B. Awareness
C. Training
D. Termination
Answer: C
Training is teaching employees to perform their work tasks and to comply with the security policy. Training is typically hosted by an organization and is targeted to groups of employees with similar job functions.
A. Worker job satisfaction
B. Metrics
C. Information security strategies
D. Budget
Answer: A
Managing the security function often includes assessment of budget, metrics, resources, information security strategies, and assessing the completeness and effectiveness of the security program.
A. Virus infection
B. Damage to equipment
C. System malfunction
D. Unauthorized access to confidential information
Answer: B
The threat of a fire and the vulnerability of a lack of fire extinguishers lead to the risk of damage to equipment.
A. Exposure factor
B. Single loss expectancy
C. Asset value
D. Annualized rate of occurrence
Answer: D
A countermeasure directly affects the annualized rate of occurrence, primarily because the countermeasure is designed to prevent the occurrence of the risk, thus reducing its frequency per year.