ISO/IEC 27005:2011 Information Security Principles Quiz
6 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are excellent online resources mentioned in the text for mapping out potential attack vectors and vulnerabilities?

  • ISO/IEC 27001:2013 & CIS Critical Security Controls
  • Mitre Att&ck & CVE (correct)
  • CISSP Study Guide & All-in-One Exam Guide
  • FAIR & ISO/IEC 27005 Cookbook

Which of the following is NOT an example of an online resource mentioned in the text for risk assessment?

  • The CIS Critical Security Controls
  • ISO/IEC 27001:2013 (correct)
  • CISSP Study Guide
  • NIST Special Publication 800-30

In which chapter of the CISSP Study Guide would one likely find information related to risk assessment?

  • Chapter 8 (correct)
  • Chapter 4
  • Chapter 2
  • Chapter 6

Which ISO standard is specifically related to Information Security Risk Management?

<p>ISO/IEC 27005:2011 (D)</p> Signup and view all the answers

What is the purpose of mapping out potential attack vectors and vulnerabilities in the context of risk assessment?

<p>To prioritize risks for mitigation (C)</p> Signup and view all the answers

Which of the following resources is related to information security controls for cyber defense?

<p>NIST Special Publication 800-30 (D)</p> Signup and view all the answers

More Like This

ISO/IEC 27035 and NIST Quiz
20 questions

ISO/IEC 27035 and NIST Quiz

ProgressiveOnyx5282 avatar
ProgressiveOnyx5282
ISO/IEC 27001 Framework Overview
10 questions
Use Quizgecko on...
Browser
Browser