FedVTE Fundamentals of Cyber Risk Management questions and answers 100% verified.
FedVTE Fundamentals of Cyber Risk Management questions and answers 100% verified. Which of the following families of controls belong to the technical class of controls? - correct answers.Identification and Authentication Which of the following is a management strategy for addressing risk? - correct answers.Accept Cyber risk management solutions are typically done through which categories of security controls? - correct answers.Technical, Physical, Administrative There are agreements organizations may enter into where one party is willing to accept an amount of risk from another. That transfer is a strategy for managing risk. - correct answers.TRUE Which security principle is concerned with the unauthorized modification of important or sensitive information? - correct answers.Integrity Simulating attack from a malicious source could be part of penetration testing. - correct answers.TRUE Which of the following is an example of a physical control? - correct answers.Security guard Incident response planning phase 1 (preparation) calls for: - correct answers.Not B or C The inputs (threat source motivation, threat capacity, nature of vulnerability, and current controls) will aid in generating output used in which step of the NIST SP risk assessment guidance? - correct answers.Likelihood Determination The threat-source is motivated and capable, but controls are in place that may impede successful exercise of the vulnerability. Which likelihood rating does this describe? - correct answers.Medium Which technical control places publicly accessible servers in a special network separated from the internal network? - correct answers.De-militarized Zone Establishing the context and providing common perspective on how organizations manage risk is the goal of: - correct answers.Risk Framing In the event of a major disaster, which of the following is a fully equipped alternate site, requiring the shortest setup time to resume full business operations? - correct answers.Hot Methods of response for managing risks are: - correct answers.Accept, Transfer, Mitigate, Avoid All of the following business assets have threats that would be included for consideration as a part of threat analysis EXCEPT: - correct answers.All of the above would be included The threat source is highly motivated and sufficiently capable, and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe? - correct answers.High Which tier of risk management is associated with Enterprise Architecture? - correct answers.Not A or D Which of the following security control class is for an information system and primarily implemented and executed by people? - correct answers.Operational OCTAVE FORTE uses the classic enterprise risk management toolset delivered in OCTAVE Allegro but tailored to make it more effective for whom to leverage the information? - correct answers.Executives Which of the following strategies for managing risk is described as: eliminating the asset's exposure to risk, or elimination of the asset itself? - correct answers.Avoid
Escuela, estudio y materia
- Institución
- FedVTE Fundamentals of Cyber Risk Management
- Grado
- FedVTE Fundamentals of Cyber Risk Management
Información del documento
- Subido en
- 22 de septiembre de 2023
- Número de páginas
- 5
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
fedvte fundamentals of cyber risk management
Documento también disponible en un lote