Realistic Risk Management Hierarchy Quiz
15 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main difference between the 'Best' and 'Worst' levels in risk management hierarchy based on the text?

  • Identification of all possible risks
  • Scoring methods for risk assessment
  • Reliance on intuition for decision-making
  • Use of quantitative models and simulations (correct)

What is the 'Baseline' level in risk management hierarchy characterized by?

  • Detailed scoring methods with reliance on results
  • Use of quantitative models
  • Ineffective methods resulting in poor decision-making
  • Reliance on intuition, explicitly avoiding unproven models (correct)

In the context of risk management, what is considered the 'Hamster Wheel of Pain' based on the provided text?

  • Control effectiveness to prioritize risk
  • Risk identification and mitigation
  • Quantification and triage based on value (correct)
  • Risk assessment meeting compliance requirements

What is emphasized as the 'Easy part' of risk management in the text?

<p>Risk identification and mitigation (C)</p> Signup and view all the answers

'Offense informs defense' in the context of risk mitigation means:

<p>Improving control effectiveness (D)</p> Signup and view all the answers

What is a key principle of Realistic Risk Management based on the text?

<p>Control Effectiveness for Risk Mitigation (D)</p> Signup and view all the answers

Which control in NIST SP 800-53 focuses on ensuring that users have the minimum level of access needed to perform their tasks?

<p>AC-6 Least Privilege (B)</p> Signup and view all the answers

Which NIST SP 800-53 control involves notifying users about unauthorized attempts to access a system?

<p>AC-9 Previous Login (Access) Notification (B)</p> Signup and view all the answers

In the NIST SP 800-53 controls, which one relates to the restriction of authorized users from performing certain actions without proper identification or authentication?

<p>AC-14 Permitted Actions Without Identification or Authentication (A)</p> Signup and view all the answers

Which NIST SP 800-53 control focuses on setting up mechanisms to secure data accessed remotely?

<p>AC-17 Remote Access (B)</p> Signup and view all the answers

Which control in NIST SP 800-53 is responsible for enforcing restrictions on how system information is shared with other entities?

<p>AC-21 Information Sharing (C)</p> Signup and view all the answers

Which NIST SP 800-53 control focuses on monitoring the use of external systems to prevent security breaches?

<p>AC-20 Use of External Systems (A)</p> Signup and view all the answers

In the context of NIST SP 800-53, which control ensures that data accessed wirelessly is done securely?

<p>AC-18 Wireless Access (D)</p> Signup and view all the answers

Which NIST SP 800-53 control focuses on supervising and reviewing access to enhance security monitoring?

<p>AC-13 Supervision and Review – Access Control (C)</p> Signup and view all the answers

Access Control for Mobile Devices' in NIST SP 800-53 aims at:

<p>Preventing unauthorized access to mobile devices (B)</p> Signup and view all the answers

More Like This

Risk Management Stages Quiz
1 questions
Risk Management Overview
13 questions
Army Risk Management Course Posttest
20 questions
Niveles de la Jerarquía de Controles
5 questions
Use Quizgecko on...
Browser
Browser