IS383 Information Systems Security Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are specific avenues that agents can exploit to attack an information asset called?

  • Vulnerabilities (correct)
  • Risk assessment
  • Assets
  • Threats

What is achieved at the end of the risk identification process?

  • Security policy recommendations
  • Risk assessment report
  • List of assets and their vulnerabilities (correct)
  • List of threats and their impact

What is the process that works best when people with diverse backgrounds within an organization work iteratively in a series of brainstorming sessions?

  • Security policy development
  • Threat management
  • Risk identification (correct)
  • Vulnerability assessment

What does risk assessment evaluate for each vulnerability?

<p>Relative risk (C)</p> Signup and view all the answers

What is the term for the process of examining how each threat could be perpetrated and listing an organization’s assets and vulnerabilities?

<p>Vulnerability identification (C)</p> Signup and view all the answers

What is the term for specific avenues that agents can exploit to attack an information asset?

<p>Vulnerabilities (D)</p> Signup and view all the answers

What is the process that works best when people with diverse backgrounds within an organization work iteratively in a series of brainstorming sessions?

<p>Risk Identification (C)</p> Signup and view all the answers

What is achieved at the end of the risk identification process?

<p>List of assets and their vulnerabilities (B)</p> Signup and view all the answers

What does risk assessment evaluate for each vulnerability?

<p>Relative risk (D)</p> Signup and view all the answers

What is the term for the process of examining how each threat could be perpetrated and listing an organization’s assets and vulnerabilities?

<p>Vulnerability Identification (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Risk Management

  • Specific avenues that agents can exploit to attack an information asset are called attack vectors.

Risk Identification

  • At the end of the risk identification process, a list of potential vulnerabilities and threats is achieved.

Brainstorming

  • The process that works best when people with diverse backgrounds within an organization work iteratively in a series of brainstorming sessions is called facilitated risk assessment.

Risk Assessment

  • Risk assessment evaluates the likelihood and impact of each vulnerability.

Threat Modeling

  • The process of examining how each threat could be perpetrated and listing an organization’s assets and vulnerabilities is called threat modeling.

Attack Vectors

  • Specific avenues that agents can exploit to attack an information asset are called attack vectors.

Facilitated Risk Assessment

  • The process that works best when people with diverse backgrounds within an organization work iteratively in a series of brainstorming sessions is called facilitated risk assessment.

Risk Identification Process

  • At the end of the risk identification process, a list of potential vulnerabilities and threats is achieved.

Risk Assessment Evaluation

  • Risk assessment evaluates the likelihood and impact of each vulnerability.

Threat Modeling Process

  • The process of examining how each threat could be perpetrated and listing an organization’s assets and vulnerabilities is called threat modeling.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team
Use Quizgecko on...
Browser
Browser