


Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
FEDVTE Fundamentals of Cyber Risk Management Assessment Questions and Answers Which of the following families of controls belong to the technical class of controls? - Correct AnswerIdentification and Authentication Which of the following is a management strategy for addressing risk? - Correct AnswerAccept Cyber risk management solutions are typically done through which categories of security controls? - Correct AnswerTechnical, Physical, Administrative There are agreements organizations may enter into where one party is willing to accept an amount of risk from another. That transfer is a strategy for managing risk. - Correct AnswerTRUE Which security principle is concerned with the unauthorized modification of important or sensitive information? - Correct AnswerIntegrity Simulating attack from a malicious source could be part of penetration testing. - Correct AnswerTRUE Whi
Typology: Exams
1 / 4
This page cannot be seen from the preview
Don't miss anything!
Which of the following families of controls belong to the technical class of controls? - Correct AnswerIdentification and Authentication Which of the following is a management strategy for addressing risk? - Correct AnswerAccept Cyber risk management solutions are typically done through which categories of security controls? - Correct AnswerTechnical, Physical, Administrative There are agreements organizations may enter into where one party is willing to accept an amount of risk from another. That transfer is a strategy for managing risk. - Correct AnswerTRUE Which security principle is concerned with the unauthorized modification of important or sensitive information? - Correct AnswerIntegrity Simulating attack from a malicious source could be part of penetration testing. - Correct AnswerTRUE Which of the following is an example of a physical control? - Correct AnswerSecurity guard Incident response planning phase 1 (preparation) calls for: - Correct AnswerNot B or C The inputs (threat source motivation, threat capacity, nature of vulnerability, and current controls) will aid in generating output used in which step of the NIST SP risk assessment guidance? - Correct AnswerLikelihood Determination The threat-source is motivated and capable, but controls are in place that may impede successful exercise of the vulnerability. Which likelihood rating does this describe? - Correct AnswerMedium Which technical control places publicly accessible servers in a special network separated from the internal network? - Correct AnswerDe-militarized Zone Establishing the context and providing common perspective on how organizations manage risk is the goal of: - Correct AnswerRisk Framing
In the event of a major disaster, which of the following is a fully equipped alternate site, requiring the shortest setup time to resume full business operations? - Correct AnswerHot Methods of response for managing risks are: - Correct AnswerAccept, Transfer, Mitigate, Avoid All of the following business assets have threats that would be included for consideration as a part of threat analysis EXCEPT: - Correct AnswerAll of the above would be included The threat source is highly motivated and sufficiently capable, and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe? - Correct AnswerHigh Which tier of risk management is associated with Enterprise Architecture? - Correct AnswerNot A or D Which of the following security control class is for an information system and primarily implemented and executed by people? - Correct AnswerOperational OCTAVE FORTE uses the classic enterprise risk management toolset delivered in OCTAVE Allegro but tailored to make it more effective for whom to leverage the information? - Correct AnswerExecutives Which of the following strategies for managing risk is described as: eliminating the asset's exposure to risk, or elimination of the asset itself? - Correct AnswerAvoid NIST SP 800-30 defines risk as a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: - Correct Answeradverse impact and likelihood of occurrence A posted sign warning unauthorized access is prohibited and the presence of security camera are what type of control? - Correct AnswerDeterrent A disaster recovery strategy where organizations transfer business to another of its branches until the event has resolved is: - Correct AnswerSelf-service Which of the following types of risk exist when a particular threat affects a large number of minor vulnerabilities and the combined affect has a significant impact? - Correct AnswerAggregate The category of security control with the goal of responding to and fixing a security incident, while also limiting or reducing further damage from the attack, is: - Correct AnswerCorrective
If the cost of controls to mitigate a risk exceeds the cost of loss the organization would incur if a threat is realized, the decision may be made to accept the risk. - Correct AnswerTRUE After actions have been implemented to mitigate a specific risk, and yet there is still some amount of risk remaining, what is that? - Correct AnswerResidual risk A burglar alarm and file integrity checkers are examples of which class of security control? - Correct AnswerDetective When considering baseline security controls, an organization would find guidance on categorizing systems, followed by identifying minimum security requirements for that system category, and finally the recommended security controls to meet those requirements - Correct AnswerFIPS 199, FIPS 200, SP 800- 53 Which of the following components do Business Impact Analysis activities focus on? - Correct AnswerAll of the above What is the main purpose of giving risk a value with risk calculation? - Correct AnswerHelp management decide how to address The expected lifetime of a device given a specific operating environment is which recovery metric? - Correct AnswerMean Time Between Failures When using the Examine Method for an assessment, all of the following are examples of actions an assessor might perform on objects EXCEPT: - Correct AnswerTesting Which of the following best describes the difference between response and recovery? - Correct AnswerTactical immediate actions versus restoration processes Which of the following is an important consideration for business impact analysis? - Correct AnswerAll of the above The equation to define risk includes all of the following variables EXCEPT: - Correct AnswerConsequence Which of the following is NOT part of the process for assessing security controls according to NIST SP 800 53A? - Correct AnswerEvaluate Which one of the following is a challenge when detailing risk factors to help determine impact and risk? - Correct AnswerCosts can be difficult to quantify When assessing risk and impact, which type of analysis uses numerical values to represent impact and likelihood, and may express consequences as monetary loss? - Correct AnswerQuantitative Analysis