Review Questions - SYS701 - 17 - Risk Management and Privacy
20 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Jen identified a missing patch on a Windows server that might allow an attacker to gain remote control of the system. After consulting with her manager, she applied the patch. From a risk management perspective, what has she done?

  • Removed the threat
  • Reduced the threat
  • Removed the vulnerability (correct)
  • Reduced the vulnerability

You notice a high number of SQL injection attacks against a web application run by your organization, so you install a web application firewall to block many of these attacks before they reach the server. How have you altered the severity of this risk?

  • Reduced the magnitude
  • Eliminated the vulnerability
  • Reduced the probability (correct)
  • Eliminated the threat

Aziz is responsible for the administration of an e-commerce website that generates $100,000 per day in revenue for his firm. The website uses a database that contains sensitive information about the firm’s customers. He expects that a compromise of that database would result in $500,000 of fines against his firm.

Aziz is assessing the risk of a SQL injection attack against the database where the attacker would steal all of the customer personally identifiable information (PII) from the database. After consulting threat intelligence, he believes that there is a 5 percent chance of a successful attack in any given year.

What is the asset value (AV)?

  • $600,000
  • $5,000
  • $100,000
  • $500,000 (correct)

What is the exposure factor (EF)?

<p>100% (D)</p> Signup and view all the answers

What is the single loss expectancy (SLE)?

<p>$500,000 (C)</p> Signup and view all the answers

What is the annualized rate of occurrence (ARO)?

<p>0.05 (A)</p> Signup and view all the answers

What is the annualized loss expectancy (ALE)?

<p>$25,000 (B)</p> Signup and view all the answers

Grace recently completed a risk assessment of her organization’s exposure to data breaches and determined that there is a high level of risk related to the loss of sensitive personal information. She is considering a variety of approaches to managing this risk.

Grace's first idea is to add a web application firewall to protect her organization against SQL injection attacks. What risk management strategy does this approach adopt?

<p>Risk mitigation (C)</p> Signup and view all the answers

Business leaders are considering dropping the customer activities that collect and store sensitive personal information. What risk management strategy would this approach use?

<p>Risk avoidance (B)</p> Signup and view all the answers

Grace's company decided to install the web application firewall and continue doing business. They are still worried about other risks to the information that were not addressed by the firewall and are considering purchasing an insurance policy to cover those risks. What strategy does this use?

<p>Risk transference (D)</p> Signup and view all the answers

In the end, Grace's risk managers found that the insurance policy was too expensive and opted not to purchase it. They are taking no additional action. What risk management strategy is being used in this situation?

<p>Risk acceptance (A)</p> Signup and view all the answers

Under the European Union's GDPR, what term is assigned to the individual who leads an organization's privacy efforts?

<p>Data protection officer (A)</p> Signup and view all the answers

Helen's organization maintains medical records on behalf of its customers, who are individual physicians. What term best describes the role of Helen's organization?

<p>Data processor (A)</p> Signup and view all the answers

Gene recently conducted an assessment and determined that his organization can be without its main transaction database for a maximum of two hours before unacceptable damage occurs to the business. What metric has Gene identified?

<p>RTO (C)</p> Signup and view all the answers

Tina works for a hospital system and manages the system's patient records. What category of personal information best describes the information that is likely to be found in those records?

<p>PHI (B)</p> Signup and view all the answers

Asa believes that her organization is taking data collected from customers for technical support and using it for marketing without their permission. What principle is most likely being violated?

<p>Purpose limitation (C)</p> Signup and view all the answers

Which one of the following U.S. government classification levels requires the highest degree of security control?

<p>Top Secret (C)</p> Signup and view all the answers

Which type of analysis uses numeric data in the analysis, resulting in assessments that allow the very straightforward prioritization of risk?

<p>Quantitative (D)</p> Signup and view all the answers

What term is given to an individual or organization who determines the reasons for processing personal information?

<p>Data controller (B)</p> Signup and view all the answers

Brian recently conducted a risk mitigation exercise and has determined the level of risk that remains after implementing a series of controls. What term best describes this risk?

<p>Residual risk (D)</p> Signup and view all the answers

Flashcards

Vulnerability Removal

Eliminating a vulnerability to prevent exploitation.

Risk Probability Reduction

Reducing the likelihood of a risk occurring.

Asset Value (AV)

The total worth of an asset.

Exposure Factor (EF)

The percentage of asset loss if an event occurs.

Signup and view all the flashcards

Single Loss Expectancy (SLE)

Expected loss from a single occurrence.

Signup and view all the flashcards

Annualized Rate of Occurrence (ARO)

Predicted number of times a loss event will occur yearly.

Signup and view all the flashcards

Annualized Loss Expectancy (ALE)

Expected loss for a threat in one year.

Signup and view all the flashcards

Risk Mitigation

Reducing risk impact or probability.

Signup and view all the flashcards

Risk Avoidance

Ceasing the activity that causes the risk.

Signup and view all the flashcards

Risk Transference

Shifting risk to a third party.

Signup and view all the flashcards

Risk Acceptance

Accepting potential risk consequences.

Signup and view all the flashcards

Data Protection Officer (DPO)

Leads an organization's GDPR privacy efforts.

Signup and view all the flashcards

Data Processor

Processes data on behalf of the data controller.

Signup and view all the flashcards

Recovery Time Objective (RTO)

Maximum time to restore a service after an outage.

Signup and view all the flashcards

PHI

Protected Health Information.

Signup and view all the flashcards

Purpose Limitation

Using data only for its intended purpose.

Signup and view all the flashcards

Top Secret

Highest level of classified U.S. government information.

Signup and view all the flashcards

Quantitative Analysis

Risk analysis using numeric data.

Signup and view all the flashcards

Data Controller

Determines the reasons for processing personal data.

Signup and view all the flashcards

Residual Risk

Risk remaining after controls implementation.

Signup and view all the flashcards

More Like This

Use Quizgecko on...
Browser
Browser