Exam Prep with correct answers 100%
2025
Document specific requirements that a customer has about any aspect of a vendor's service
performance.
A) DLR
B) Contract
C) SLR
D) NDA - Correct Answer C) SLR (Service-Level Requirements)
_________ identifies and triages risks. - Correct Answer Risk Assessment
_________ are external forces that jeopardize security. - Correct Answer Threats
_________ are methods used by attackers. - Correct Answer Threat Vectors
_________ are the combination of a threat and a vulnerability. - Correct Answer Risks
We rank risks by _________ and _________. - Correct Answer Likelihood and impact
_________ use subjective ratings to evaluate risk likelihood and impact. - Correct Answer Qualitative
Risk Assessment
_________ use objective numeric ratings to evaluate risk likelihood and impact. - Correct Answer
Quantitative Risk Assessment
_________ analyzes and implements possible responses to control risk. - Correct Answer Risk Treatment
,_________ changes business practices to make a risk irrelevant. - Correct Answer Risk Avoidance
_________ reduces the likelihood or impact of a risk. - Correct Answer Risk Mitigation
An organization's _________ is the set of risks that it faces. - Correct Answer Risk Profile
_________ Initial Risk of an organization. - Correct Answer Inherent Risk
_________ Risk that remains in an organization after controls. - Correct Answer Residual Risk
_________ is the level of risk an organization is willing to accept. - Correct Answer Risk Tolerance
_________ reduce the likelihood or impact of a risk and help identify issues. - Correct Answer Security
Controls
_________ stop a security issue from occurring. - Correct Answer Preventive Control
_________ identify security issues requiring investigation. - Correct Answer Detective Control
_________ remediate security issues that have occurred. - Correct Answer Recovery Control
Hardening == Preventative - Correct Answer Virus == Detective
Backups == Recovery - Correct Answer For exam (Local and Technical Controls are the same)
_________ use technology to achieve control objectives. - Correct Answer Technical Controls
_________ use processes to achieve control objectives. - Correct Answer Administrative Controls
,_________ impact the physical world. - Correct Answer Physical Controls
_________ tracks specific device settings. - Correct Answer Configuration Management
_________ provide a configuration snapshot. - Correct Answer Baselines (track changes)
_________ assigns numbers to each version. - Correct Answer Versioning
_________ serve as important configuration artifacts. - Correct Answer Diagrams
_________ and _________ help ensure a stable operating environment. - Correct Answer Change and
Configuration Management
Purchasing an insurance policy is an example of which risk management strategy? - Correct Answer Risk
Transference
What two factors are used to evaluate a risk? - Correct Answer Likelihood and Impact
What term best describes making a snapshot of a system or application at a point in time for later
comparison? - Correct Answer Baselining
What type of security control is designed to stop a security issue from occurring in the first place? -
Correct Answer Preventive
What term describes risks that originate inside the organization? - Correct Answer Internal
What four items belong to the security policy framework? - Correct Answer Policies, Standards,
Guidelines, Procedures
_________ describe an organization's security expectations. - Correct Answer Policies (mandatory and
approved at the highest level of an organization)
, _________ describe specific security controls and are often derived from policies. - Correct Answer
Standards (mandatory)
_________ describe best practices. - Correct Answer Guidelines (recommendations/advice and
compliance is not mandatory)
_________ step-by-step instructions. - Correct Answer Procedures (not mandatory)
_________ describe authorized uses of technology. - Correct Answer Acceptable Use Policies (AUP)
_________ describe how to protect sensitive information. - Correct Answer Data Handling Policies
_________ cover password security practices. - Correct Answer Password Policies
_________ cover use of personal devices with company information. - Correct Answer Bring Your Own
Device (BYOD) Policies
_________ cover the use of personally identifiable information. - Correct Answer Privacy Policies
_________ cover the documentation, approval, and rollback of technology changes. - Correct Answer
Change Management Policies
Which element of the security policy framework includes suggestions that are not mandatory? - Correct
Answer Guidelines
What law applies to the use of personal information belonging to European Union residents? - Correct
Answer GDPR
What type of security policy normally describes how users may access business information with their
own devices? - Correct Answer BYOD Policy