(SPIPC) Exam Questions And Answers Verified 100%
Correct
What is the purpose of the risk assessment step of the risk management process? -
ANSWER • Integrate information about the impact of undesirable events (collected
during the asset assessment step) and the likelihood of undesirable events (based on
information collected during the threat and vulnerability assessment steps) to determine
What is the primary benefit of conducting the risk management process? - ANSWER •
National-level security policy endorses a holistic risk management approach, allowing
decision makers to effectively allocate resources that provide the necessary security to
assets that match the threat to those assets
What are the primary costs of conducting the risk management process? - ANSWER •
Time and effort necessary to execute the five steps of the risk management process
What are the potential challenges security practitioners may face when enacting the risk
management process? - ANSWER • Availability of information necessary to accurately
determine the likelihood and impact of undesirable events
Where can we get information to evaluate an organization's compliance with security
policies? - ANSWER • Self-inspections
Where can we get information to evaluate the effectiveness of an organization's security
program? - ANSWER • Incident reports
• Regressive analysis
• SME interviews (individuals involved in protecting Classified Military Information (CMI))
• Security planning documents
• Surveys and audits
• Information Systems (IS) Certification and Accreditation documentation
• Facility certification and accreditation documentation
Given the incident, what is an example of an organization complying with security policy,
but the measure(s) it implemented appear to be ineffective? - ANSWER • The
appropriate signage and notices are posted in appropriate areas, but are potentially
ineffective considering a history of uncleared personnel gaining access to restricted
areas.
How do security policies and programs contribute to managing risks to Department of
Defense (DoD) assets? - ANSWER • Security policies manage risks to DoD assets by