Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

FEDVTE Fundamentals of Cyber Risk Management Assessment Questions and Answers, Exams of Human Resource Management

FEDVTE Fundamentals of Cyber Risk Management Assessment Questions and Answers Which of the following families of controls belong to the technical class of controls? - Correct AnswerIdentification and Authentication Which of the following is a management strategy for addressing risk? - Correct AnswerAccept Cyber risk management solutions are typically done through which categories of security controls? - Correct AnswerTechnical, Physical, Administrative There are agreements organizations may enter into where one party is willing to accept an amount of risk from another. That transfer is a strategy for managing risk. - Correct AnswerTRUE Which security principle is concerned with the unauthorized modification of important or sensitive information? - Correct AnswerIntegrity Simulating attack from a malicious source could be part of penetration testing. - Correct AnswerTRUE Whi

Typology: Exams

2024/2025

Available from 02/11/2025

dillon-cole
dillon-cole 🇺🇸

4.3

(6)

1.9K documents

1 / 4

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
FEDVTE Fundamentals of Cyber Risk Management
Assessment Questions and Answers
Which of the following families of controls belong to the technical class of controls? -
Correct AnswerIdentification and Authentication
Which of the following is a management strategy for addressing risk? - Correct
AnswerAccept
Cyber risk management solutions are typically done through which categories of
security controls? - Correct AnswerTechnical, Physical, Administrative
There are agreements organizations may enter into where one party is willing to accept
an amount of risk from another. That transfer is a strategy for managing risk. - Correct
AnswerTRUE
Which security principle is concerned with the unauthorized modification of important or
sensitive information? - Correct AnswerIntegrity
Simulating attack from a malicious source could be part of penetration testing. - Correct
AnswerTRUE
Which of the following is an example of a physical control? - Correct AnswerSecurity
guard
Incident response planning phase 1 (preparation) calls for: - Correct AnswerNot B or C
The inputs (threat source motivation, threat capacity, nature of vulnerability, and current
controls) will aid in generating output used in which step of the NIST SP risk
assessment guidance? - Correct AnswerLikelihood Determination
The threat-source is motivated and capable, but controls are in place that may impede
successful exercise of the vulnerability. Which likelihood rating does this describe? -
Correct AnswerMedium
Which technical control places publicly accessible servers in a special network
separated from the internal network? - Correct AnswerDe-militarized Zone
Establishing the context and providing common perspective on how organizations
manage risk is the goal of: - Correct AnswerRisk Framing
pf3
pf4

Partial preview of the text

Download FEDVTE Fundamentals of Cyber Risk Management Assessment Questions and Answers and more Exams Human Resource Management in PDF only on Docsity!

FEDVTE Fundamentals of Cyber Risk Management

Assessment Questions and Answers

Which of the following families of controls belong to the technical class of controls? - Correct AnswerIdentification and Authentication Which of the following is a management strategy for addressing risk? - Correct AnswerAccept Cyber risk management solutions are typically done through which categories of security controls? - Correct AnswerTechnical, Physical, Administrative There are agreements organizations may enter into where one party is willing to accept an amount of risk from another. That transfer is a strategy for managing risk. - Correct AnswerTRUE Which security principle is concerned with the unauthorized modification of important or sensitive information? - Correct AnswerIntegrity Simulating attack from a malicious source could be part of penetration testing. - Correct AnswerTRUE Which of the following is an example of a physical control? - Correct AnswerSecurity guard Incident response planning phase 1 (preparation) calls for: - Correct AnswerNot B or C The inputs (threat source motivation, threat capacity, nature of vulnerability, and current controls) will aid in generating output used in which step of the NIST SP risk assessment guidance? - Correct AnswerLikelihood Determination The threat-source is motivated and capable, but controls are in place that may impede successful exercise of the vulnerability. Which likelihood rating does this describe? - Correct AnswerMedium Which technical control places publicly accessible servers in a special network separated from the internal network? - Correct AnswerDe-militarized Zone Establishing the context and providing common perspective on how organizations manage risk is the goal of: - Correct AnswerRisk Framing

In the event of a major disaster, which of the following is a fully equipped alternate site, requiring the shortest setup time to resume full business operations? - Correct AnswerHot Methods of response for managing risks are: - Correct AnswerAccept, Transfer, Mitigate, Avoid All of the following business assets have threats that would be included for consideration as a part of threat analysis EXCEPT: - Correct AnswerAll of the above would be included The threat source is highly motivated and sufficiently capable, and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe? - Correct AnswerHigh Which tier of risk management is associated with Enterprise Architecture? - Correct AnswerNot A or D Which of the following security control class is for an information system and primarily implemented and executed by people? - Correct AnswerOperational OCTAVE FORTE uses the classic enterprise risk management toolset delivered in OCTAVE Allegro but tailored to make it more effective for whom to leverage the information? - Correct AnswerExecutives Which of the following strategies for managing risk is described as: eliminating the asset's exposure to risk, or elimination of the asset itself? - Correct AnswerAvoid NIST SP 800-30 defines risk as a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: - Correct Answeradverse impact and likelihood of occurrence A posted sign warning unauthorized access is prohibited and the presence of security camera are what type of control? - Correct AnswerDeterrent A disaster recovery strategy where organizations transfer business to another of its branches until the event has resolved is: - Correct AnswerSelf-service Which of the following types of risk exist when a particular threat affects a large number of minor vulnerabilities and the combined affect has a significant impact? - Correct AnswerAggregate The category of security control with the goal of responding to and fixing a security incident, while also limiting or reducing further damage from the attack, is: - Correct AnswerCorrective

If the cost of controls to mitigate a risk exceeds the cost of loss the organization would incur if a threat is realized, the decision may be made to accept the risk. - Correct AnswerTRUE After actions have been implemented to mitigate a specific risk, and yet there is still some amount of risk remaining, what is that? - Correct AnswerResidual risk A burglar alarm and file integrity checkers are examples of which class of security control? - Correct AnswerDetective When considering baseline security controls, an organization would find guidance on categorizing systems, followed by identifying minimum security requirements for that system category, and finally the recommended security controls to meet those requirements - Correct AnswerFIPS 199, FIPS 200, SP 800- 53 Which of the following components do Business Impact Analysis activities focus on? - Correct AnswerAll of the above What is the main purpose of giving risk a value with risk calculation? - Correct AnswerHelp management decide how to address The expected lifetime of a device given a specific operating environment is which recovery metric? - Correct AnswerMean Time Between Failures When using the Examine Method for an assessment, all of the following are examples of actions an assessor might perform on objects EXCEPT: - Correct AnswerTesting Which of the following best describes the difference between response and recovery? - Correct AnswerTactical immediate actions versus restoration processes Which of the following is an important consideration for business impact analysis? - Correct AnswerAll of the above The equation to define risk includes all of the following variables EXCEPT: - Correct AnswerConsequence Which of the following is NOT part of the process for assessing security controls according to NIST SP 800 53A? - Correct AnswerEvaluate Which one of the following is a challenge when detailing risk factors to help determine impact and risk? - Correct AnswerCosts can be difficult to quantify When assessing risk and impact, which type of analysis uses numerical values to represent impact and likelihood, and may express consequences as monetary loss? - Correct AnswerQuantitative Analysis