Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CIS4361 Chapter 4 Q&A

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
08-04-2025
Written in
2024/2025

CIS4361 Chapter 4 Q&A

Institution
CIS4361
Course
CIS4361

Content preview

CIS4361 Chapter 4 Q&A
A(n) disaster recovery plan dictates the actions an organization can and perhaps should take
while an incident is in progress. - =False


Internal benchmarking can provide the foundation for baselining. - =False


Each of the threats faced by an organization must be examined to assess its potential to endanger
the organization and this examination is known as a threat profile. - =False


Some argue that it is virtually impossible to determine the true value of information and
information-bearing assets. - =True


Protocols are activities performed within the organization to improve security. - =False


Security efforts that seek to provide a superior level of performance in the protection of
information are referred to as best business practices. - =True


Best business practices are often called recommended practices. - =True


Risk evaluation assigns a risk rating or score to each information asset. - =False


Major risk is a combined function of (1) a threat less the effect of threat-reducing safeguards, (2)
a vulnerability less the effect of vulnerability reducing safeguards, and (3) an asset less the effect
of asset value-reducing safeguards. - =False


Qualitative-based measures are comparisons based on numerical standards, such as numbers of
successful attacks. - =False


Eliminating a threat is an impossible proposition. - =False

, A(n) exposure factor is the expected percentage of loss that would occur from a particular attack.
- =True


One problem with benchmarking is that there are many organizations that are identical. - =False


When determining the relative importance of each asset, refer to the organization's mission
statement or statement of objectives to determine which elements are essential, which are
supportive, and which are merely adjuncts. - =True


CBAs cannot be calculated after controls have been functioning for a time. - =False


Once the organizational threats have been identified, an assets identification process is
undertaken. - =False


Benefit is the value that an organization realizes by using controls to prevent losses associated
with a specific vulnerability. - =True


The results from risk assessment activities can be delivered in a number of ways: a report on a
systematic approach to risk control, a project-based risk assessment, or a topic-specific risk
assessment. - =True


When the organization is pursuing an overall risk management program, it requires a(n)
systematic report that enumerates the opportunities for controlling risk. - =True


The general management of an organization must structure the IT and information security
functions to defend the organization's information assets. - =True


A(n) qualitative assessment is based on characteristics that do not use numerical measures. -
=True


You should adopt naming standards that do not convey information to potential system attackers.
- =True

Written for

Institution
CIS4361
Course
CIS4361

Document information

Uploaded on
April 8, 2025
Number of pages
10
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers
$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
hurryben
3.0
(1)

Get to know the seller

Seller avatar
hurryben Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
2 year
Number of followers
5
Documents
1808
Last sold
11 months ago

3.0

1 reviews

5
0
4
0
3
1
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions