You are analyzing a risk and have determined that the SLE is 1000 and the ARO

You are analyzing a risk and have determined that the

This preview shows page 7 - 12 out of 40 pages.

You are analyzing a risk and have determined that the SLE is $1,000 and the ARO is 5. What is the ALE? A.$200B.$5,000C.$60,000D.None of the above Correct Answer Key: B Question 7 of 15 7.0 Points When performing a risk assessment, how do you calculate a potential cost/benefit?
Image of page 7
Correct A.(Original ALE – New ALE) – cost of the countermeasure per year B.(Original ALE – New ALE) + cost of the countermeasure per year C.SLE × ARO D.SLE / ARO Answer Key: A Question 8 of 15 7.0 Points A _________ is any segment, subnet, network, or collection of networks that represent a certain level of risk. Correct Answer Key: D Question 9 of 15 7.0 Points What can a firewall provide that is a form of static reversal of network translation? Correct Answer Key: C Question 10 of 15 7.0 Points You have a firewall between a programming group’s network and the production network. What is the best option to enable on the firewall to prevent unapproved versions of software from leaking out? Correct A.Content filtering
Image of page 8
B.Intrusion prevention C.Encryption D.Protocol filtering Answer Key: A Question 11 of 15 6.0 Points What is the primary purpose of log monitoring? Correct Answer Key: B Question 12 of 15 6.0 Points What is an important thing to do regarding firewall logs? Correct A.Review the log files frequently. B.Only enable logging when under attack, in order to reduce performance impacts. C.Only log well-known ports, other ports are rarely attacked or scanned. D.Never store historical log files because they are of no use and take up disk space. Answer Key: A Question 13 of 15 6.0 Points Which firewall limitation is typically characterized by a memory-based exploit? A.Denial of Service (DoS)B.Bufer overflowC.Bug Correct
Image of page 9
D.Fragmentation Answer Key: B Question 14 of 15 6.0 Points Regarding firewall rules, what is another name for default deny? Correct A.Deny all B.Allow by default C.Deny none D.None of the above Answer Key: A Question 15 of 15 6.0 Points Deciding which firewall rules to define is subject to an organization’s _____________. Correct Answer Key: A Week 3 Quiz Question 1 of 15 7.0 Points
Image of page 10
Image of page 11
Image of page 12

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture