Unformatted text preview: Quick Links Logout
Narendar Reddy Talasani1 Hom
e T ab 2 of 2 (active tab) 1. 2019_SPR_MAIN_Info. Security and Risk Mgmt._50 2. Content 3. Residency Weekend (March 1, 2019 - March 3, 2019) 4. Take Test: Midterm - Information Security & Risk Management (Spring 2019) 2019_SPR_MAIN_Info. Security and Risk Mgmt._50 Home Page
Help Course Messages
Groups My Groups IRM Groups 5 Take Test: Midterm - Information Security &
Risk Management (Spring 2019)
Timed Test Multiple
Completion This test has a time limit of 3 hours.This test will save and submit automatically
when the time expires.
Warnings appear when half the time, 5 minutes, 1 minute, and 30
Not allowed. This test can only be taken once.
Once started, this test must be completed in one sitting. Do not leave the test
before clicking Save and Submit. Remaining Time:
1 hour, 32 minutes, 54 seconds. Question Completion Status: QUESTION 1 1. A (n) ____________ assessment attempts to identify vulnerabilities that
can actually be exploited. 2. risk
1 points 1. QUESTION 2 An RA team should focus both on critical areas and on what
management might consider important.
1 points 1. QUESTION 3 A _________ is the likelihood that a loss will occur. 2. threat
1 points QUESTION 4 1. A security policy provides a high-level overview of the goals of security
and the details of how to implement security techniques.
1 points QUESTION 5 1. Asset valuation is not a major priority of risk management.
1 points QUESTION 6 1. A loss results in a compromise to business functions, and a threat
results in a compromise to business assets.
1 points QUESTION 7 1. A __________ grants the authority to perform an action on a system. A
__________ grants access to a resource. 2. right,
1 points 1. QUESTION 8 After you collect data on risks and recommendations, you include that
information in a report, and you give that report to management. Why do you
do this? 2. to avoid several time-consuming presentations about each individual
to inform management of the progress of the risk management task
to help management decide which recommendations to use
to help management asses how much of the risk was mitigated by the
1 points QUESTION 9 1. A gap analysis report documents differences between what is
mitigated and what is not mitigated, resulting in a gap in security.
1 points QUESTION 10 1. All of the following terms have the same meaning EXCEPT: 2. cause and effect
1 points 1. QUESTION 11 All of the following are steps involved in creating an affinity diagram,
EXCEPT: 2. brainstorming
creating an affinity diagram
gathering ideas into related
identifying the problem
1 points QUESTION 12 1. All stakeholders have vested interests in their projects and want to see
those projects succeed.
1 points QUESTION 13 1. An exploit assessment is also known as a(n) ___________. 2. exploit list
1 points 1. QUESTION 14 A(n) _________ is the process of creating a list of threats. 2. threat
1 points QUESTION 15 1. A failover cluster requires at least __________ node(s). 2. 1
1 points 1. QUESTION 16 A(n) __________ is a computer joined to a botnet. 2. robot
1 points QUESTION 17 1. A threat is a weakness, but a vulnerability is an activity that represents
a possible danger.
1 points QUESTION 18 1. A critical path chart shows a list of project tasks that must be
completed on time.
1 points QUESTION 19 1. A loss results in a compromise to business functions, and a threat
results in a compromise to business assets.
1 points QUESTION 20 1. AUP stands for acceptable use policy.
1 points QUESTION 21 1. A transaction is any addition, deletion, or modification of data.
False 1 points QUESTION 22 1. All of the following are major components of RAs, EXCEPT: 2. identifying
1 points 1. QUESTION 23 A new company starts up but does not have a lot of revenue for the
first year. Installing anti-virus software for all the company’s computers would
be very costly, so the owners decide to forgo purchasing anti-virus software for
the first year of the business. In what domain of typical IT infrastructure is
vulnerability created? 2. workstation
1 points QUESTION 24 1. A(n) ___________________ is performed to identify the most serious risks,
help you manage risks, and identify the best methods to control risks. 2. RA
1 points 1. QUESTION 25 A milestone plan chart is a simple graphical representation of major
1 points Click Save and Submit to save and submit. Click Save All Answers to save all answers. ...
View Full Document