Who has the primary responsibility of determining the classification level for information?
a. Functional manager
b. Senior management
c. Owner
d. User
a. Employees
b. Hackers
c. Attackers
d. Contractors
a. Decrease the security level on the information to ensure accessibility and usability of the information.
b. Require specific approval each time an individual needs to access the information.
c. Increase the security controls on the information.
d. Increase the classification label on the information.
a. Type of employees, contractors, and customers who will be accessing the data.
b. Confidentiality, integrity, and availability.
c. First assess the risk level and implement the correct countermeasures.
d. The access controls that will be protecting the data.
a. Data owners
b. Users
c. Administrators
d. Management
a. Rules on how software and hardware must be used within the environment
b. Step-by-step directions on how to accomplish a task
c. Guidelines on how to approach security situations that are not covered by standards
d. Compulsory actions
a. Senior management support
b. Effective controls and implementation methods
c. Updated and relevant security policies and procedures
d. Security awareness by all employees
a. Never—good security addresses and reduces all risks.?
b. When political issues prevent this type of risk from being addressed.
c. When the necessary countermeasure is complex.
d. When the cost of the countermeasure outweighs the value of the asset and potential loss.
a. Step-by-step directions on how to accomplish security tasks
b. General guidelines to use to accomplish a specific security level
c. Broad, high-level statements from the management
d. Detailed documents explaining how security incidents should be handled
a. Risk analysis
b. Cost/benefit analysis
c. ALE results
d. Identifying the vulnerabilities and threats causing the risk
a. Quantifies the security level of the environment
b. Estimates the loss possible for a countermeasure
c. Quantifies the cost/benefit result
d. Estimates the loss potential of a threat in a year span
a. Mid-term
b. Long-term
c. Day-to-day
d. Six months
a. An instance of being exposed to losses from a threat
b. Any potential danger to information or systems
c. An information security absence or weakness
d. A loss potential of a threat
a. Technical and non-technical methods (can also be preventative, detective, deterrent)
b. Countermeasures and safeguards (reactive in nature)
c. Physical security and technical controls (missing stuff like administrative controls)
d. Procedural security and encryption
a. Only the military has true security.
b. Businesses usually care more about data integrity and availability, whereas the military is more concerned with confidentiality.
c. The military requires higher levels of security because the risks are so much higher.
d. The business sector usually cares most about data availability and confidentiality, whereas the military is most concerned about integrity.
a. Threats x risks x asset value
b. (Treats x asset value x vulnerability) x risks + control gap
c. SLE x frequency = ALE
d. (Threats x vulnerability x asset value) x controls gap
a. Delegate responsibility.
b. Quantify impact of potential threats.
c. Identify risks.
d. Define the balance between the impact of a risk and the cost of the necessary countermeasure.
a. It shows management how much could be lost if the security measure is not implemented.
b. It calculates the frequency of the risk times the cost/benefit ratio of the ALE.
c. It shows management how much money could be saved if the security program was implemented.
d. It provides the qualitative severity of the security measure.
a. Support
b. Perform risk analysis
c. Define purpose and scope
d. Delegate responsibility
a. To make sure the process is fair and that no one is left out.
b. They shouldn’t — it should be a small group brought in from outside the organization because otherwise the analysis is biased and unusable.
c. Because people in different departments understand the risks of their department and it ensures that the data going into the analysis is as close to reality as possible.
d. Because the people in the different departments are the ones causing the risks, so they should be the ones held accountable.
a. Scenario-based analysis to research different security threats
b. A method used to apply severity levels to potential loss, probability of loss, and risks
c. A method that assigns monetary values to components in the risk assessment
d. A method that is based off of gut feelings and opinions
a. It is possible, which is why it is used.
b. It assigns severity levels. Thus, it is hard to translate into monetary values.
c. It is dealing with purely quantitative elements.
d. Quantitative measures must be applied to qualitative elements.
a. A lot of data has to be gathered to be inputted into the automated tool.
b. Management has to approve it and then a team has to be built.
c. Risk analysis cannot be automated because of the nature of the assessment.
d. Many people have to agree on the same data.
a. Standards
b. Due process
c. Due care
d. Downstream liabilities