Podcast
Questions and Answers
Which of the following best describes risk in the context of asset protection?
Which of the following best describes risk in the context of asset protection?
- The combination of a threat and vulnerability (correct)
- A threat to a critical asset
- The identification of critical assets
- The value of the asset being threatened
What is the purpose of identifying assets in the risk management process?
What is the purpose of identifying assets in the risk management process?
- To assess the vulnerabilities of the assets
- To determine the value of the assets
- To prioritize the assets for protection (correct)
- To calculate the risk of the assets
Which framework is commonly used to discuss the nature of threats in risk management?
Which framework is commonly used to discuss the nature of threats in risk management?
- The CIA triad (correct)
- The backup tape example
- The physical controls example
- The Parkerian hexad
What is the relationship between vulnerabilities and threats in risk assessment?
What is the relationship between vulnerabilities and threats in risk assessment?
Which of the following is NOT considered a risk in the given context?
Which of the following is NOT considered a risk in the given context?
What are physical controls in the context of risk management?
What are physical controls in the context of risk management?
What are logical controls in the context of risk management?
What are logical controls in the context of risk management?
What are administrative controls in the context of risk management?
What are administrative controls in the context of risk management?
What is the purpose of mitigating risks in the risk management process?
What is the purpose of mitigating risks in the risk management process?
What is the significance of a single point of failure in the context of risk assessment?
What is the significance of a single point of failure in the context of risk assessment?
Which type of attack primarily affects the integrity of a system, but could also affect availability?
Which type of attack primarily affects the integrity of a system, but could also affect availability?
Which type of attack involves generating email as a method for propagating malware?
Which type of attack involves generating email as a method for propagating malware?
Which type of tape in the shipment of backup tapes example would likely be of very little utility to an attacker or unauthorized person?
Which type of tape in the shipment of backup tapes example would likely be of very little utility to an attacker or unauthorized person?
Which operating system is unlikely to be affected by a virus that is problematic on a Windows operating system?
Which operating system is unlikely to be affected by a virus that is problematic on a Windows operating system?
What is the likelihood that something bad will happen called?
What is the likelihood that something bad will happen called?
Which factor might be considered a vulnerability in an environment?
Which factor might be considered a vulnerability in an environment?
Which type of attack involves generating data, processes, communications, or other similar material with a system?
Which type of attack involves generating data, processes, communications, or other similar material with a system?
Which type of tape in the shipment of backup tapes example would be of much greater utility to an attacker or unauthorized person?
Which type of tape in the shipment of backup tapes example would be of much greater utility to an attacker or unauthorized person?
Which type of attack involves generating enough additional processes, network traffic, email, web traffic, or nearly anything else that consumes resources to conduct an availability attack?
Which type of attack involves generating enough additional processes, network traffic, email, web traffic, or nearly anything else that consumes resources to conduct an availability attack?
Which type of attack primarily affects integrity but could also affect availability?
Which type of attack primarily affects integrity but could also affect availability?
Flashcards are hidden until you start studying