(ISC)2 Certified in Cybersecurity - Exam Prep
(ISC)2 Certified in Cybersecurity - Exam Prep Document specific requirements that a customer has about any aspect of a vendor's service performance. A) DLR B) Contract C) SLR D) NDA C) SLR (Service-Level Requirements) _________ identifies and triages risks. Risk Assessment _________ are external forces that jeopardize security. Threats _________ are methods used by attackers. Threat Vectors _________ are the combination of a threat and a vulnerability. Risks We rank risks by _________ and _________. Likelihood and impact _________ use subjective ratings to evaluate risk likelihood and impact. Qualitative Risk Assessment _________ use objective numeric ratings to evaluate risk likelihood and impact. Quantitative Risk Assessment _________ analyzes and implements possible responses to control risk. Risk Treatment _________ changes business practices to make a risk irrelevant. Risk Avoidance _________ reduces the likelihood or impact of a risk. Risk Mitigation An organization's _________ is the set of risks that it faces. Risk Profile _________ Initial Risk of an organization. Inherent Risk
Written for
- Institution
- 2 Certified in Cybersecurity
- Course
- 2 Certified in Cybersecurity
Document information
- Uploaded on
- February 21, 2024
- Number of pages
- 94
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
isc2 certified in cybersecurity exam prep