(ISC)2 Certified in Cybersecurity - Exam Prep | 100% Correct Answers | Verified | Latest 2024 Version
(ISC)2 Certified in Cybersecurity - Exam Prep | 100% Correct Answers | Verified | Latest 2024 Version Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA - C) SLR (Service-Level Requirements) _________ identifies and triages risks. - Risk Assessment _________ are external forces that jeopardize security. - Threats _________ are methods used by attackers. - Threat Vectors _________ are the combination of a threat and a vulnerability. - Risks We rank risks by _________ and _________. - Likelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. - Qualitative Risk Assessment _________ use objective numeric ratings to evaluate risk likelihood and impact. - Quantitative Risk Assessment _________ analyzes and implements possible responses to control risk. - Risk Treatment _________ changes business practices to make a risk irrelevant. - Risk Avoidance _________ reduces the likelihood or impact of a risk. - Risk Mitigation An organization's _________ is the set of risks that it faces. - Risk Profile _________ Initial Risk of an organization. - Inherent Risk _________ Risk that remains in an organization after controls. - Residual Risk _________ is the level of risk an organization is willing to accept. - Risk Tolerance _________ reduce the likelihood or impact of a risk and help identify issues. - Security Controls _________ stop a security issue from occurring. - Preventive Control _________ identify security issues requiring investigation. - Detective Control _________ remediate security issues that have occurred. - Recovery Control Hardening == Preventative - Virus == Detective Backups == Recovery - For exam (Local and Technical Controls are the same) _________ use technology to achieve control objectives. - Technical Controls _________ use processes to achieve control objectives. - Administrative Controls _________ impact the physical world. - Physical Controls _________ tracks specific device settings. - Configuration
Written for
- Institution
- 2 Certified in Cybersecurity -
- Module
- 2 Certified in Cybersecurity -
Document information
- Uploaded on
- May 29, 2024
- Number of pages
- 94
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc2 certified in cybersecurity exam prep 10
Also available in package deal