100%(1)1 out of 1 people found this document helpful
This preview shows page 1 - 4 out of 12 pages.
QUESTION 1What is NOT an example of an intangible value?future lost revenuecost of gaining a consumercustomer influencedata0.4 points QUESTION 2A _________ is the likelihood that a loss will occur.0.4 points QUESTION 3What are often the weakest links in IT security?0.4 points QUESTION 4What are the elements of the security triad?0.4 points QUESTION 5Total risk = _______________threat x vulnerabilitythreat x vulnerability x asset valuebenefit - cost
(benefit – cost) x asset value0.4 points QUESTION 6A new company starts up but does not have a lot of revenue for the first year. Installing anti-virus software for all the company’s computers would be very costly, so the owners decide to forgo purchasing anti-virus software for the first year of the business. In what domain of typical IT infrastructure is vulnerability created?0.4 points QUESTION 7What is NOT a step in risk management?0.4 points QUESTION 8What is the most commonly seen attack?0.4 points QUESTION 9A teenager learning about computers and programming for the first time writes a simple program meant to disrupt the function of his sister’s computer. While she’s hanging out with friends at the mall, he enters his sister’s IP address, launches the program, and waits to see what will happen. The teenager is an example of a ___________.hackerDoS attacker
script kiddieDDoS attacker0.4 points QUESTION 10What is one source of risk reduction?0.4 points QUESTION 11Identify the acronym that does NOT refer to an initiative taken by the government to help companies manage IT risks.0.4 points