Preview

CISSP CBK Review Final Exam Week 5

Powerful Essays
Open Document
Open Document
10293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
CISSP CBK Review Final Exam Week 5
CISSP CBK Review Final Exam (Deandre Felder)
CISSP CBK Review Page 1
1. A risk is the likelihood of a threat agent taking advantage of a vulnerability to an information system. Risks left over after implementing safeguards is known as: A. Leftover risks B. Residual risks. C. Remaining risks. D. Exposures.
2. Copyright provides what form of protection:
A. Protects an author’s right to distribute his/her works.
B. Protects information that provides a competitive advantage.
C. Protects the right of an author to prevent unauthorized use of his/her works.
D. Protects the right of an author to prevent viewing of his/her works.
3. As an information systems security professional, what is the highest amount would you recommend to a corporation to invest annually on a countermeasure for protecting their assets valued at $1 million from a potential threat that has an annualized rate of occurrence (ARO) of once every five years and an exposure factor (EF) of 10% : A. $100,000 B. $20,000.
C. $200,000 D. $40,000.
4. Which of the following describes the first step in establishing an encrypted session using a Data Encryption Standard (DES) key? A. Key clustering
B. Key compression
C. Key signing
D. Key exchange
5. In a typical information security program, what is the primary responsibility of information (data) owner? A. Ensure the validity and accuracy of data. B. Determine the information sensitivity or classification level. C. Monitor and audit system users. D. Ensure availability of data.
6. Which of the following is not a component of “chain of evidence??”
A. Location evidence obtained.
B. Time evidence obtained.
C. Who discovered the evidence? D. Identification of person who left the evidence.
7. When an employee transfers within an organization … A. The employee must undergo a new security review. B. The old system IDs must be disabled.
C. All access permission should be reviewed.
D. The employee must turn in all access devices.

You May Also Find These Documents Helpful

  • Good Essays

    A: It’s a good idea to invest in the additional security. The net annual probable outlay decreases from $15,00 to $12,00.The annual value of countermeasure is $2,250. This shows that investing in countermeasure A is more economically rational than forgoing the added security benefits…

    • 542 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    2) What is the main goal of information security? A) Protect information from unauthorized use.…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    2. What is the relationship between risks, threats, and vulnerabilities as it pertains to information systems…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 3 Essay

    • 764 Words
    • 4 Pages

    8. Identify the five components of an information system. Which are most directly impacted by the study of computer security? Which are most commonly associated with its…

    • 764 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Fin 370

    • 461 Words
    • 3 Pages

    Risk is the potential that a chosen action or activity (including the choice of inaction) will lead to a loss (an undesirable outcome).…

    • 461 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 4 Definitions  Risk: Probability that an intentional or unintentional act will harm resources  Threat: Any accidental or intentional event that negatively impacts company resources  Vulnerability: Inherent weakness that may enable threats to harm system or networks Risks, threats, and vulnerabilities affect confidentiality, integrity, and availability (CIA). NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    Kaplan, S, and Garrick, B. J (2006) say that risk is the notion of uncertainty while there being a likelihood of some kind of loss or damage and that risk is simply the conversion of a hazard into the delivery of a loss of damage. They say risk can be reduced through safeguards and use an example of being out in the ocean, which is a hazard, and instead of crossing it in a rowboat, which would be a high risk; you can cross it in a liner to reduce that risk. According to the Oxford English Dictionary the definition of risk is ‘a situation involving exposure to danger’. Both definitions are similar but Kaplan and Garrick’s is more detailed by explaining that hazards are the source of the risk.…

    • 2276 Words
    • 10 Pages
    Best Essays
  • Better Essays

    Risk is the chance or probability that a person will be harmed or experience an adverse health effect if exposed to a hazard.…

    • 2324 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Analisys Paper

    • 905 Words
    • 4 Pages

    Boughton article he mention one of the concept of risk an “Event” that has the power to cause damage or disruption. Event is defined A thing that…

    • 905 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    A Risk Assessment is periodic assessment of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. A risk assessment should include a consideration of the major factors in risk management: the value of the system or application, threats, vulnerabilities, and the effectiveness of current or proposed safeguards.…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Risk manage

    • 2685 Words
    • 10 Pages

    Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities. Risk management’s objective is to assure uncertainty does not deflect the endeavour from the business goals.…

    • 2685 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    1. Understand how Risk Management works. Risk is the effect (positive or negative) of an event. It is computed from the probability of the event materializing (becoming an issue) and the impact it would have (Risk = Probability X Impact). Various factors should be identified in order to analyze risk, including:…

    • 1956 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Chapter 4 Risk Management

    • 1318 Words
    • 6 Pages

    1. What is risk management? Why is identification of risks, by listing assets and their vulnerabilities, so important to the risk management process? Risk management is the process of identifying risk, as represented by vulnerabilities, to an organization’s information assets and infrastructure, and taking steps to reduce this risk to an acceptable level. Each of the three elements in the C.I.A. triangle, introduced in Chapter 1, is an essential part of every IT organization’s ability to sustain long-term competitiveness. When an organization depends on IT-based systems to remain viable, information security and the discipline of risk management must become an integral part of the economic basis for making business decisions. These decisions are based on trade-offs between the costs of applying information systems controls and the benefits realized from the operation of secured, available systems.…

    • 1318 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Simulation Optimization

    • 6084 Words
    • 25 Pages

    Whenever uncertainty exists, there is risk. Uncertainty is present when there is a possibility that the outcome of a particular event will deviate from what is expected. In some cases, we can use past experience and other information to try to estimate the probability of occurrence of different events. This allows us to estimate a probability distribution for all possible events. Risk can be defined as the probability of occurrence of an event that would have a negative effect on a goal. On the other hand, the probability of occurrence of an event that would have a positive impact is…

    • 6084 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    Strategic Risk Taking

    • 4871 Words
    • 20 Pages

    By definition, risk must have two attributes: uncertainty about outcome and impact on utility. A risk is an event where there is enough information to assess both the probability and the consequences. Risk in finance is defined as the variability of actual returns on investment around an expected return. The essence of good management is making the right choices when it comes to dealing with different risks. The most successful companies are good at finding particular risks that they can exploit better than their competitors. In the recent sub prime…

    • 4871 Words
    • 20 Pages
    Powerful Essays