Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CIS4361 Chapter 4 Q&A

Beoordeling
-
Verkocht
-
Pagina's
10
Cijfer
A+
Geüpload op
08-04-2025
Geschreven in
2024/2025

CIS4361 Chapter 4 Q&A

Instelling
CIS4361
Vak
CIS4361

Voorbeeld van de inhoud

CIS4361 Chapter 4 Q&A
A(n) disaster recovery plan dictates the actions an organization can and perhaps should take
while an incident is in progress. - =False


Internal benchmarking can provide the foundation for baselining. - =False


Each of the threats faced by an organization must be examined to assess its potential to endanger
the organization and this examination is known as a threat profile. - =False


Some argue that it is virtually impossible to determine the true value of information and
information-bearing assets. - =True


Protocols are activities performed within the organization to improve security. - =False


Security efforts that seek to provide a superior level of performance in the protection of
information are referred to as best business practices. - =True


Best business practices are often called recommended practices. - =True


Risk evaluation assigns a risk rating or score to each information asset. - =False


Major risk is a combined function of (1) a threat less the effect of threat-reducing safeguards, (2)
a vulnerability less the effect of vulnerability reducing safeguards, and (3) an asset less the effect
of asset value-reducing safeguards. - =False


Qualitative-based measures are comparisons based on numerical standards, such as numbers of
successful attacks. - =False


Eliminating a threat is an impossible proposition. - =False

, A(n) exposure factor is the expected percentage of loss that would occur from a particular attack.
- =True


One problem with benchmarking is that there are many organizations that are identical. - =False


When determining the relative importance of each asset, refer to the organization's mission
statement or statement of objectives to determine which elements are essential, which are
supportive, and which are merely adjuncts. - =True


CBAs cannot be calculated after controls have been functioning for a time. - =False


Once the organizational threats have been identified, an assets identification process is
undertaken. - =False


Benefit is the value that an organization realizes by using controls to prevent losses associated
with a specific vulnerability. - =True


The results from risk assessment activities can be delivered in a number of ways: a report on a
systematic approach to risk control, a project-based risk assessment, or a topic-specific risk
assessment. - =True


When the organization is pursuing an overall risk management program, it requires a(n)
systematic report that enumerates the opportunities for controlling risk. - =True


The general management of an organization must structure the IT and information security
functions to defend the organization's information assets. - =True


A(n) qualitative assessment is based on characteristics that do not use numerical measures. -
=True


You should adopt naming standards that do not convey information to potential system attackers.
- =True

Geschreven voor

Instelling
CIS4361
Vak
CIS4361

Documentinformatie

Geüpload op
8 april 2025
Aantal pagina's
10
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
hurryben
3,0
(1)

Maak kennis met de verkoper

Seller avatar
hurryben Harvard University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
12
Lid sinds
2 jaar
Aantal volgers
5
Documenten
1808
Laatst verkocht
11 maanden geleden

3,0

1 beoordelingen

5
0
4
0
3
1
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen