100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

AWR-177 Module 4 Questions And Answers With Complete Solutions 100% Correct Answers

Rating
-
Sold
-
Pages
3
Grade
A+
Uploaded on
11-05-2024
Written in
2023/2024

___________________ are key to completing a full risk management plan, since the tolerances will determine which hazards may be accepted versus those risk events that need to be limited. - AnswerStakeholder tolerance levels Which three of the following are considered to be questions or testing methods for host network vulnerabilities during vulnerability analysis? - Answer-a. Use of intrusion detection and protection b. WPA use for wireless networks c. Access limitation to known devices A relative scale is used in the qualitative risk quantification process, while a currency scale is used in the ____________ risk quantification process. - Answer-Quantitative Hazard probabilities, asset vulnerabilities and threat impact are all aspects of _________________. - Answer-Risk quantification The goal of risk quantification is to produce a list of risks that can be segregated as: - Answer-NOT: All of the above Which of the following would be considered a root cause of a fire threat? - Answer-Storing flammable cleaning agents The FIPS 199 impact analysis scale considers impacts in relation to the loss of three security goals. Which of the following is one of the security goals examined by the FIPS 199 standard? - Answer-Integrity The ISO/IEC 27002:2005 standard is a code of practice for information security management, containing security controls and practices. What is its function? - Answer-To help establish or improve an organization's information security management programWhich is the correct equation for quantitative risk quantification? - Answer-EMV = probability * vulnerability * impact Risk tolerance involves both risk attitude and risk capacity. Risk attitude refers to the organization's _______________________, while risk capacity describes the maximum amount of risk that the organization can assume. - Answer-Willingness to incur risk Risk grading uses what two factors to determine the severity of a hazard? - Answer-NOT: Vulnerability and impact Which of the following is NOT used for determining asset vulnerability? - Answer-NOT: Questionnaires According to the classification of hazards, a black hat hacker would be classified as a ________________. - Answer-Malicious human hazard Which of the following is considered a business risk? - Answer-Investments in stock Which of the following is the formula used for the Failure Mode and Effects Analysis risk quantification method? - Answer-Risk Priority Number = Severity * Likelihood of Occurrence * Detection Inability Which of the following is a method for determining hazard likelihood or probability? - Answer-All of the above Questionnaires, walkthroughs, and penetration testing are all commonly-used methods of determining ________________. - Answer-Asset vulnerability The FIPS 199 impact analysis scale considers impacts in relation to the loss of which three security goals? (Select the three correct answers) - Answer-a. Integrity c. Confidentialityd. Availability The ISO/IEC 27002:2005 standard is a code of practice for information security management, containing security ________________ to help establish or improve an organization's information security management program. - Answer-Controls and practices Which of the following is NOT a goal of risk quantification? - Answer-Determining threat stakeholders According to the classification of hazards, an unlocked door is considered to be a(n) _________________. - Answer-Non-malicious human hazard Which of the following is NOT a method for determining hazard likelihood or probability? - Answer-Asset vulnerability A key factor in risk quantification is ___________. - Answer-Asset vulnerabilities In the formula for the Failure Mode and Effects Analysis risk quantification method, the rated variables (such as severity) range from _______________. The resulting Risk Priority Number ranges from 1 to 1000. - Answer-1 to 10 One risk quantification method compares and examines two factors - impact and probability (likelihood) - to determine the severity of a hazard. What is this method? - Answer-NOT: Risk grading NOT: Risk scenarios

Show more Read less
Institution
AWR-177 Module 4
Course
AWR-177 Module 4








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
AWR-177 Module 4
Course
AWR-177 Module 4

Document information

Uploaded on
May 11, 2024
Number of pages
3
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ACADEMICMATERIALS City University New York
View profile
Follow You need to be logged in order to follow users or courses
Sold
569
Member since
2 year
Number of followers
186
Documents
10590
Last sold
2 days ago

4.1

96 reviews

5
53
4
12
3
21
2
3
1
7

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions