Chapter8

Assigning a value to each information asset the

Info iconThis preview shows pages 2–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Which of the following activities is part of the risk identification process? Assigning a value to each information asset The standard IT system components include: people, data, networks, hardware, software, and ____________________. procedures As each information asset is identified, categorized, and ____, a relative value must also be assigned to it. classified To make the process of analyzing threats less daunting, steps in the threat and vulnerability identification processes should be handled jointly. False Almost every organization is aware of its image in the local, national, and international spheres. Loss or ____ of some assets would prove especially embarrassing. . .. Which of the following activities is part of the risk assessment process? Calculating the risks to which assets are exposed in their current setting The ____ is also referred to as an electronic serial number. MAC address Classification categories must be ____ (all inventoried assets fit into a category) and ____ (each asset is found in only one category). comprehensive, mutually exclusive The relative value of an information asset depends on how much ____ it generates—or, in the case of a nonprofit organization, how critical it is to service delivery. revenue Assessing risks includes assigning a value to each information asset. False People are divided into insiders (employees) and outsiders (nonemployees). Outsiders come in two categories: either they hold trusted roles and have correspondingly greater authority and accountability, or they are regular staff without any special privileges. False Likelihood is the overall rating of the probability that a specific vulnerability will be exploited. True In a TVA worksheet, along one asset lies the prioritized set of ____, along the other the prioritized set of ____. assets, threats
Background image of page 2

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page2 / 3

Assigning a value to each information asset The standard IT...

This preview shows document pages 2 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online