Preview

Itt Risk Managment Final Answers

Better Essays
Open Document
Open Document
778 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Itt Risk Managment Final Answers
In which of the IT domains is a database considered a major component of risk?
System/Application Domain

Which of the following is not a risk management technique?
Certification

A CBA is an effort to
Compare the impact of a realized risk to the economic risk associated with managing it

Which of the following is not a technique for mitigating vulnerabilities?
Programming bugs

A DoS attack is a threat action affecting which IT domain?
LAN-WAN Domain

To which of the following does HIPAA apply?
Health insurance companies

To which of the following does FERPA apply?
Educational institutions

Which of the following standards contains eight principles specific to security?
GAISP

Which of the following standards gives detailed descriptions of IT practices and comprehensive checklists, tasks, and procedures that can be tailed by IT organizations to fit their needs?
ITIL

Which agency enforces the SOX
SEC

Which of the following is not a step in the risk control process?
Risk identification

Which of the following is responsible for planning, budgeting, and performance of information system security?
IT management

Who must make trade off decisions regarding system security?
System and information owners

Who develops appropriate training materials for risk management?
Security awareness personnel

Which of the following is a goal of an organization's risk management?
Ability to perform the mission

Which of the following is not a step in performing a RA?
Organizing company assets

Why is RA a good idea?
Protect assets

Which of the following is a type of RA?
Qualitative

Which of the following is not a threat?
Poor firewall configuration

What is scope?
Extent or range of view, outlook, application, operation, and effectiveness

Which of the following is a technique for identifying threats?
Review historical data

Which of the following is an example of administrative control?
Policies and procedures

You May Also Find These Documents Helpful

  • Satisfactory Essays

    iii.Install water saving devices such as native plants, tank, dual flush toilet systems, 5-6 star (WELS) dishwasher.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    8-16 (Analytical procedures) In audit planning the audit of Circuits Technology, Inc. (CTI). CTI resells, installs, and provides computer networking products (client software, gateway hardware and software, and twinax hardware) to other businesses. Figure 8-14 provides some summary information from CTI’s financial statements.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    References: Whitman, M., & Mattord, H. (2010). Management of Information Security (3rd ed.). Retrieved from https://ecampus.phoenix.edu/content/eBookLibrary2/content/eReader.aspx?…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    What would you most commonly do to reduce the potential risk from a threat/vulnerability pair?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    Conducting a thorough risk assessment is certainly one of the top priorities in the overall risk management program. It is a process of identifying and evaluating the risks that can have a negative impact on an organization. Once the risks have been successfully captured, they can be assessed and prioritized according to the severity of their potential impact. While every organization should have a continuous risk management program, a risk assessment is conducted at a given moment in time, and as such should be repeated on some predetermined schedule to reevaluate the risks and adjust as appropriate. To conduct an effective risk assessment, it’s important to be able to fundamentally describe of the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Additionally, a methodology that is appropriate for the risk assessment should be selected.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 786 Words
    • 4 Pages

    Pizza rush is a large take-away company in Australia with a total of to take-away stores scattered in all major cities nationwide…

    • 786 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Risk Assesments

    • 972 Words
    • 4 Pages

    Describe three procedures used to promote and maintain a healthy and safe sporting environment (P4). Explain three procedures used to promote and maintain a health and safety sporting environment (M3). Analyse three procedures used to promote and maintain a healthy and safe sporting environment.…

    • 972 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    6. The domain the represents the greatest risk and uncertainty to an organization would be the System/Application Domain. This is where the servers and monetary data are located.…

    • 465 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    The Integrated Distributors Incorporated is a publically traded company that is facing many challenges. The company’s Information technology infrastructure has been ignored and many of its operating locations are running outdated hardware and software, which greatly increases the risk to the network in relations to confidentiality, integrity, and availability. Because of the outdated hardware and software, the company suffered some network compromises through their JV internet site and it led to disclosures of sensitive and strategic information.…

    • 622 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Risk Management

    • 607 Words
    • 3 Pages

    The candidate does not develop a social responsibility strategy for the chosen client that includes an environmental considerations and recommendations component.…

    • 607 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Management Success

    • 1462 Words
    • 5 Pages

    The paper is intended to inform the reader of the steps that a risk management program should take in order to ensure that safety and security are upheld. The security and protection of information is more difficult than ever before due to the expanse of technology that is used in the world. Information can be hacked in to and utilized for fraudulent purposes. Personal information of random populations is sought by convicted felons and illegal organizations for the purpose of identity theft and financial gain. The recent inception of identity theft pays tribute to the realization that modern technology truly presents higher risk in terms of security breaches. Alongside the need for security of information is the protection of safety of both staff and patients alike. This aspect of risk management holds a great amount of weight in terms of evaluating the success of a program, as adverse events can cost an organization their accreditation and often times their funding and viability can be negatively affected. The overall goal for this piece is to discuss risk managements involvement in the handling of infectious waste and the protection of private health information by assessing the role of a risk manager, the objectives set forth for a risk management team, and by reviewing the training provided to employees.…

    • 1462 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Risk Management

    • 1604 Words
    • 7 Pages

    According to the Risk Management section of Wells Fargo’s 2011 Annual Report, to be successful they manage and control three major business risks: credit, asset/liability, and market risk. As for this paper, I’m only going to discuss about their credit and interest rate risk, which is managed under their asset/liability section. Wells Fargo has continued to invest in its risk infrastructure especially since it is a larger and more complex company than before it merged with Wachovia. Wells Fargo’s Senior Executive Vice President and Chief Risk Officer, Michael Loughlin states that they have three lines of defense for managing the risks:…

    • 1604 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Risk Management

    • 1271 Words
    • 6 Pages

    As risk manger it is brought to your attention that a Nurse Green in the OR is upset with her rotation schedule and what she feels is slander against her professional abilities. The OR supervisor when asked indicated Ms. Green, had complained to her that a physician, Dr. Ray, had made several passes at her, made suggestive remarks to her and asked her to go out with him repeatedly. Nurse Green indicated she had told him no but he still persisted. She is upset because the new rotation schedule is out for the OR and she was removed from the type of surgery she specializes in which includes all of Dr. Ray’s cases. When she asked why she was told the physician requested she not be in his rotation until she gained more experience. The nurse is upset and indicated she never had a problem with any of the surgeons prior to this and requests a meeting with the supervisor and risk manager/Human resource director.…

    • 1271 Words
    • 6 Pages
    Better Essays
  • Good Essays

    internal and external users to whom access to the organization’s network, data or other sensitive…

    • 3990 Words
    • 15 Pages
    Good Essays