100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

AWR-177 Module 4 Questions And Answers With Complete Solutions 100% Correct Answers

Puntuación
-
Vendido
-
Páginas
3
Grado
A+
Subido en
11-05-2024
Escrito en
2023/2024

___________________ are key to completing a full risk management plan, since the tolerances will determine which hazards may be accepted versus those risk events that need to be limited. - AnswerStakeholder tolerance levels Which three of the following are considered to be questions or testing methods for host network vulnerabilities during vulnerability analysis? - Answer-a. Use of intrusion detection and protection b. WPA use for wireless networks c. Access limitation to known devices A relative scale is used in the qualitative risk quantification process, while a currency scale is used in the ____________ risk quantification process. - Answer-Quantitative Hazard probabilities, asset vulnerabilities and threat impact are all aspects of _________________. - Answer-Risk quantification The goal of risk quantification is to produce a list of risks that can be segregated as: - Answer-NOT: All of the above Which of the following would be considered a root cause of a fire threat? - Answer-Storing flammable cleaning agents The FIPS 199 impact analysis scale considers impacts in relation to the loss of three security goals. Which of the following is one of the security goals examined by the FIPS 199 standard? - Answer-Integrity The ISO/IEC 27002:2005 standard is a code of practice for information security management, containing security controls and practices. What is its function? - Answer-To help establish or improve an organization's information security management programWhich is the correct equation for quantitative risk quantification? - Answer-EMV = probability * vulnerability * impact Risk tolerance involves both risk attitude and risk capacity. Risk attitude refers to the organization's _______________________, while risk capacity describes the maximum amount of risk that the organization can assume. - Answer-Willingness to incur risk Risk grading uses what two factors to determine the severity of a hazard? - Answer-NOT: Vulnerability and impact Which of the following is NOT used for determining asset vulnerability? - Answer-NOT: Questionnaires According to the classification of hazards, a black hat hacker would be classified as a ________________. - Answer-Malicious human hazard Which of the following is considered a business risk? - Answer-Investments in stock Which of the following is the formula used for the Failure Mode and Effects Analysis risk quantification method? - Answer-Risk Priority Number = Severity * Likelihood of Occurrence * Detection Inability Which of the following is a method for determining hazard likelihood or probability? - Answer-All of the above Questionnaires, walkthroughs, and penetration testing are all commonly-used methods of determining ________________. - Answer-Asset vulnerability The FIPS 199 impact analysis scale considers impacts in relation to the loss of which three security goals? (Select the three correct answers) - Answer-a. Integrity c. Confidentialityd. Availability The ISO/IEC 27002:2005 standard is a code of practice for information security management, containing security ________________ to help establish or improve an organization's information security management program. - Answer-Controls and practices Which of the following is NOT a goal of risk quantification? - Answer-Determining threat stakeholders According to the classification of hazards, an unlocked door is considered to be a(n) _________________. - Answer-Non-malicious human hazard Which of the following is NOT a method for determining hazard likelihood or probability? - Answer-Asset vulnerability A key factor in risk quantification is ___________. - Answer-Asset vulnerabilities In the formula for the Failure Mode and Effects Analysis risk quantification method, the rated variables (such as severity) range from _______________. The resulting Risk Priority Number ranges from 1 to 1000. - Answer-1 to 10 One risk quantification method compares and examines two factors - impact and probability (likelihood) - to determine the severity of a hazard. What is this method? - Answer-NOT: Risk grading NOT: Risk scenarios

Mostrar más Leer menos
Institución
AWR-177 Module 4
Grado
AWR-177 Module 4








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
AWR-177 Module 4
Grado
AWR-177 Module 4

Información del documento

Subido en
11 de mayo de 2024
Número de páginas
3
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$8.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
ACADEMICMATERIALS City University New York
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
569
Miembro desde
2 año
Número de seguidores
186
Documentos
10590
Última venta
2 días hace

4.1

96 reseñas

5
53
4
12
3
21
2
3
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes