

Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
A series of questions and answers related to cyber risk management for technicians. It covers topics such as host characteristic monitoring, residual risk acceptance, information system security objectives, network analysis tools, security standards, risk assessment methodologies, and change control processes. Useful for individuals seeking to understand and apply cyber risk management principles in a technical context.
Typology: Exams
1 / 3
This page cannot be seen from the preview
Don't miss anything!
In order to automate host characteristic monitoring you can compare baselines and snapshots with syslog. - Correct AnswersFalse The following should be taken into account when accepting the residual risk inherent in the project. - Correct AnswersAll of the above What is the high water mark for an information system? - Correct AnswersHighest Potential Impact value assigned to each Security Objective (AIC) for all Security Categories resident on the system and the overall classification of the system. Which of the following describes NetScan Tools Pro? - Correct AnswersB. A powerful command line packet analyzer C. A tool that provides advanced network trace routing D. A collection of Internet information gathering and network troubleshooting utilities FIPS 200 is: - Correct AnswersA short document that describes the minimum security requirements for information and information systems Which risk comes from a failure of the controls to properly mitigate risk? - Correct AnswersA. Inherent risk C. Control Risk D. All of the above Open Source Security (OSSEC) is what? - Correct AnswersA host based security system that monitors for changes What tool would be best to automatically detect your network and construct a complete and easy to view network map? - Correct AnswersLANsurveyor Which NIST special publication is a guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach? - Correct AnswersNIST SP 800 37 Which of the following is a part of the Examine Method? - Correct AnswersInspecting the physical security measures
If the cost of controls exceeds the benefit the organization may choose to accept the risk instead. - Correct AnswersTrue Which of the following families of controls belongs to the technical class of controls? - Correct AnswersIdentification and Authentication Which tier of Risk Management is associated with Enterprise Architecture? - Correct AnswersTier 2 Mission (Business Process) In NIST SP 800 53 the security control structure consists of all the following components except for: - Correct AnswersAll of these are in the security control structure: