Podcast
Questions and Answers
What are excellent online resources mentioned in the text for mapping out potential attack vectors and vulnerabilities?
What are excellent online resources mentioned in the text for mapping out potential attack vectors and vulnerabilities?
- ISO/IEC 27001:2013 & CIS Critical Security Controls
- Mitre Att&ck & CVE (correct)
- CISSP Study Guide & All-in-One Exam Guide
- FAIR & ISO/IEC 27005 Cookbook
Which of the following is NOT an example of an online resource mentioned in the text for risk assessment?
Which of the following is NOT an example of an online resource mentioned in the text for risk assessment?
- The CIS Critical Security Controls
- ISO/IEC 27001:2013 (correct)
- CISSP Study Guide
- NIST Special Publication 800-30
In which chapter of the CISSP Study Guide would one likely find information related to risk assessment?
In which chapter of the CISSP Study Guide would one likely find information related to risk assessment?
- Chapter 8 (correct)
- Chapter 4
- Chapter 2
- Chapter 6
Which ISO standard is specifically related to Information Security Risk Management?
Which ISO standard is specifically related to Information Security Risk Management?
What is the purpose of mapping out potential attack vectors and vulnerabilities in the context of risk assessment?
What is the purpose of mapping out potential attack vectors and vulnerabilities in the context of risk assessment?
Which of the following resources is related to information security controls for cyber defense?
Which of the following resources is related to information security controls for cyber defense?