Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 1 5 ( 1 point ) Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices
Question point Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy? Question options: Choose Your Own Device CYOD Bring Your Own Device BYOD Companyownedpersonally enabled COPE Companyowned businessonly COBO Question point Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows a crosssite scripting attack against the server. What term describes the issue that Adam discovered? Question options: Threat Vulnerability Risk Impact Question point Which term describes an action that can damage or compromise an asset? Question options: Risk Vulnerability Countermeasure Threat Question point Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $ million in damage to the facility, which has a $ million value. Given this scenario, what is the exposure factor EF Question options: percent percent percent percent Question point Saved Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $ million in damage to the facility, which has a $ million value. Given this scenario, what is the annualized loss expectancy ALE Question options: $ $ $ $ Question point Aditya is the security manager for a midsized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take? Question options: Reduce Transfer Accept Avoid Question point What term describes the risk that exists after an organization has performed all planned countermeasures and controls? Question options: Total risk Qualitative risk Exposure Residual risk Question point Violet deploys an intrusion prevention system IPS on her network as a security control. What type of control has Violet deployed? Question options: Detective Preventive Corrective Deterrent Question point Forensics and incident response are examples of controls. Question options: detective preventive corrective deterrent
Question point
Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy?
Question options:
Choose Your Own Device CYOD
Bring Your Own Device BYOD
Companyownedpersonally enabled COPE
Companyowned businessonly COBO
Question point
Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows a crosssite scripting attack against the server. What term describes the issue that Adam discovered?
Question options:
Threat
Vulnerability
Risk
Impact
Question point
Which term describes an action that can damage or compromise an asset?
Question options:
Risk
Vulnerability
Countermeasure
Threat
Question point
Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $ million in damage to the facility, which has a $ million value. Given this scenario, what is the exposure factor EF
Question options:
percent
percent
percent
percent
Question point
Saved
Maria is the risk manager for a large organization and is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $ million in damage to the facility, which has a $ million value. Given this scenario, what is the annualized loss expectancy ALE
Question options:
$
$
$
$
Question point
Aditya is the security manager for a midsized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take?
Question options:
Reduce
Transfer
Accept
Avoid
Question point
What term describes the risk that exists after an organization has performed all planned countermeasures and controls?
Question options:
Total risk
Qualitative risk
Exposure
Residual risk
Question point
Violet deploys an intrusion prevention system IPS on her network as a security control. What type of control has Violet deployed?
Question options:
Detective
Preventive
Corrective
Deterrent
Question point
Forensics and incident response are examples of controls.
Question options:
detective
preventive
corrective
deterrent
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access with AI-Powered Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started