• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Which of the following terms is used to describe the loss of value to an asset based on a single security incident?

SLE

An estimate based on the historical data of how often a threat would be successful in exploiting a vulnerability is known as:

ARO (Annualized Rate of Occurrence)

What is the correct formula for calculating probable financial loss due to a risk over a one-year period?

ALE = ARO x SLE




Annualized Loss Expectancy =


Annualized Rate of Occurrence x


Single Loss Expectancy

Which of the following terms is used to describe the average time required to repair a failed component or device?

MTTR (Mean Time To Recovery)

High MTBF value indicates that a component or system provides low reliability and is more likely to fail. (True / False)

False

A calculation of the Single Loss Expectancy (SLE) is an example of:

Quantitative risk assessment

Assessment of risk probability and its impact based on subjective judgment falls into the category of:

Qualitative risk assessment

A path or tool allowing an attacker to gain unauthorized access to a system or network is known as:

Threat vector

In quantitative risk assessment, this term is used for estimating the likelihood of occurrence of a future threat.

ARO (Annualized Rate of Occurrence)

Contracting out a specialized technical component when the company's employees lack the necessary skills is an example of:

Risk transference

Disabling certain system functions or shutting down the system when risks are identified is an example of:

Risk avoidance

Which of the following answers exemplifies implementation of the risk transference methodology?

Insurance policy

Which of the following terms relates closely to the concept of residual risk?

Risk acceptance

What type of risk management strategy is in place when accessing the network involves a login banner warning designed to inform potential attacker of the likelihood of getting caught?

Risk deterrence

Which of the following security control types can be used in implementing a risk mitigation strategy? (Select three answers)

Technical, Management, Operational

Which of the following terms refers to one of the hardware-related disadvantages of the virtualization technology?

Single point of failure

Which of the following acronyms refers to a maximum tolerable period of time required for restoring business functions after a failure or disaster?

RTO (Recovery time objective)


Recovery time objective (RTO) specifies a point in time to which systems and data must be recovered after a disaster has occurred.


(True / False)

False

Which of the following answers refers to a key document governing the relationship between two business organisations?

BPA

A document established between two or more parties to define their respective responsibilities in accomplishing a particular goal or mission is known as:

MOU (Memorandum of Understanding)

Which of the following answers refers to an agreement established between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection?

ISA (Interconnection Security Agreement)

Which of the following functionalities allows a DLP system to fulfil its role?

Content inspection

In forensic procedures, a sequence of steps in which different types of evidence should be collected is known as:

Order of volatility

In forensic procedures, a chronological record outlining persons in possession of an evidence is referred to as:

Chain of custody