CISSP Study Guide- Questions with 100% Correct Answers
Information Security Management Communicates risks accepted by the organization due to the currently implemented security controls, and it continually works to cost effectively enhance the controls to minimize the risk to the companies information assets, Threat Exploiting a vulnerability Threat agent. What actually exploits a threat. Risk Probability of a vulnerability being exploited by a threat, resulting in business impact. Relationships Associating vulnerabilities to threats, to determine the level of risk. Who deals with risk? It should be delegated to those business units (including senior management), who are responsible for dealing with that risk in their departments. Exposure When a vulnerability exists in an environment. Authorization Creep A user gaining too much access due to job and role changes. Permissions and rights, added over time, as a person moves through the company Countermeasure A control put in place to mitigate potential losses. Goal of risk management Providing optimal security, at minimal cost. Security Management Practices to manage Risk- Risk Assessment. Risk Analysis. Data Classification. Security Awareness. Risk Management System for identifying , analyzing evaluating, remedying and monitoring risk. Minimizes loss to information assets due to undesirable events, through
Geschreven voor
- Instelling
- CISSP - Certified Information Systems Security Professional
- Vak
- CISSP - Certified Information Systems Security Professional
Documentinformatie
- Geüpload op
- 15 juni 2024
- Aantal pagina's
- 70
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cissp study guide questions with 100 correct ans
-
information security management communicates risk
-
threat exploiting a vulnerability