Filters
Question type

Study Flashcards

What is the difference between avoidance of risk and acceptance of risk?

Correct Answer

verifed

verified

Avoidance is the risk control strategy t...

View Answer

____ is the process of examining and documenting the security posture of an organization's information technology and the risks it faces.


A) Risk identification
B) Data classification
C) Security clearance
D) DR

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

____________________ is defined by the Committee on National Security Systems (CNSS)as the protection of information and its critical elements,including the systems and hardware that use,store,and transmit that information.

Correct Answer

verifed

verified

Informatio...

View Answer

A ____ deals with the preparation for and recovery from a disaster,whether natural or man-made.


A) mitigation plan
B) disaster recovery plan
C) risk management
D) risk assessment

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

The vision of an organization is a written statement of an organization's purpose.

A) True
B) False

Correct Answer

verifed

verified

____ is the process of moving the organization toward its vision.


A) Transference
B) Avoidance
C) Strategic planning
D) Mitigation

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

What is a polymorphic threat?

Correct Answer

verifed

verified

A polymorphic threat is one that changes...

View Answer

A ____ is a document that expresses how an organization ensures that critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site if a catastrophic incident or disaster occurs.


A) risk assessment plan
B) business continuity plan
C) Trojan horse
D) worm

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

What is the difference between transference and mitigation?

Correct Answer

verifed

verified

Transference is the control approach tha...

View Answer

____ ensures that only those with the rights and privileges to access information are able to do so.


A) Confidentiality
B) Availability
C) Integrity
D) Risk assessment

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer