The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
1-Hubs are better than switches because switches increase the risk of sniffing attacks.
 a.True
 b.False
Â
2-What is the primary reason to avoid risk?
a.Risks create vulnerabilities and threats.
b.The impact of the risk outweighs the benefit of the asset.
c.Risks are easily exploited.
d.Risks can destroy a business.
Â
3.Survivability = Risks + Costs
 a.True
 b.False
Â
4.As a top-level executive at your own company, you are worried that your employees may steal confidential data too easily by downloading and taking home data onto thumb drives. What is the best way to prevent this from happening?
a.Install a technical control to prevent the use of thumb drives.
b.Instruct higher level employees to inform their employees that the use of a thumb drive is a fireable offense.
c.Hold a seminar that explains to employees why the use of thumb drives in the workplace is a security hazard
d.enforce a written company policy against the use of thumb drives, and install a technical controls on the computers that will prevent the use of thumb drives.
Â
5.Balanced security satisfies everyone.
 a.True
b. False
Â
6.What is the best example of warez?
a.software
b.hardware
c.a file on your computer of tonight's new Game of Thrones episode you downloaded for free
d.an MP3 file of a new Cage the Elephant single you bought with iTunes money
Â
7.Out-of-pocket costs are costs to reduce risks that a company CEO must pay for with his own money rather than the company's funds.
 True
 False
Â
8.A(n) _________ is the process of creating a list of threats.
a.threat identification
b.threat assessment
c,risk assessment
d.risk identification
Â
9.The ultimate goal in risk management is to protect the organization.
a. True
 b.False
Â
10Risk __________ is the practice of identifying, assessing, controlling, and mitigating risks.
a.assessment
b.mitigation
c.management
d.evaluation
Â
11.A loss results in a compromise to business functions, and a threat results in a compromise to business assets.
 a.True
b. False
Â
12.What is NOT a step in risk management?
a.taking steps to reduce risk to an accepted level
b.identifying risks
c.assessing risks
d.eliminating all risks
Â
13.Profitability = Revenue - Costs
a. True
b. False
Â
14.CBK stands for Cost Benefit Knowledge.
 a.True
 b.False
Â
15Companies use risk management techniques to differentiate ___________ from _________?
vulnerabilities,
a. threatsvulnerabilities,
b.weaknessessevere risks,
c.minor riskscosts,
4.benefits
Â
16.When a threat exploits a vulnerability, it results in a(n) __________.
a.impact
b.loss
c.crime
d.liability
Â
17.Risk sharing shifts a portion of the responsibility or liability.
 a.True
 b.False
Attachments:
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly