FedVTE Cyber Risk Management for Managers questions and answers 100% verified.
FedVTE Cyber Risk Management for Managers questions and answers 100% verified. Which step of a risk assessment uses the history of system attacks? A. Step 2: Threat Identification B. Step 3: Vulnerability Identification C. Step 4: Control Analysis D. Step 5: Likelihood Determination - correct answers.A. Step 2: Threat Identification In which one of the following is modifying important or sensitive information categorized? A. Confidentiality B. Availability C. Integrity D. All of the above - correct answers.C. Integrity Of the risk mitigation steps, in which step does management determine the most cost-effective control(s) for reducing risk to the organization's mission? A. Step 3: Conduct Cost-Benefit Analysis B. Step 4: Select Controls C. Step 5: Assign Responsibility D. Step 6: Develop a Safeguard Implementation Plan - correct answers.B. Step 4: Select Controls Which of the following is the set of security controls for an information system that is primarily implemented and executed by people? A. Operational Controls B. Management Controls C. Technical Controls D. All of the above - correct answers.A. Operational Controls Software as a Service is one class of Cloud Computing. A. True B. False - correct answers.A. True If the availability of a service was critical to your organization, what would you say the impact would be if the service was irrevocably destroyed? A. High B. Medium C. Low D. None of the above - correct answers.A. High Low humidity within a server room could result in a static electricity build-up/discharge. A. True B. False - correct answers.A. True Which of the following is the ability to hide messages in existing data? A. Cryptography B. Scareware C. Steganography D. Whaling - correct answers.C. Steganography Which of the following firewall implementations is a combination of a packet filter with bastion host? A. Screened-subnet B. Dual-homed C. Boundary D. Screened-host - correct answers.D. Screened-host Countermeasures do not reduce a threat or vulnerability. A. True B. False - correct answers.B. False Which of the following malware will allow an attacker to dynamically install additional malware? A. Virus B. Attack Script C. Trojan D. Downloader - correct answers.D. Downloader Which of the following is an algorithm or hash that uniquely identifies a specific virus, worm or variant of malicious code? A. Heuristics B. Steganography C. Integrity Checkers D. Signature - correct answers.B. Steganography Which tier of Risk Management is associated with Enterprise Architecture? A. Tier 1, Organization, Governance B. Tier 2, Mission, Business Process C. Tier 3, Information System, Environment of Operations D. None of the above - correct answers.B. Tier 2, Mission, Business Process Which type of analysis is often expressed as: annual loss expectancy = (asset value x exposure factor) x annual rate of occurrence? A. Quantitative Analysis B. Qualitative Analysis C. Gap Analysis D. None of the above - correct answers.A. Quantitative Analysis A locking mechanism which is controlled by a mechanical key pad is known as?
Written for
- Institution
- FedVTE Cyber Risk Management for Managers
- Course
- FedVTE Cyber Risk Management for Managers
Document information
- Uploaded on
- September 22, 2023
- Number of pages
- 9
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fedvte cyber risk management for managers
Document also available in package deal