Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Which of the following is a type of risk mitigation security control? Out-place controls Unplanned controls Planned controls Ad-hoc controls An organization is checking servers
- Which of the following is a type of risk mitigation security control?
- Out-place controls
- Unplanned controls
- Planned controls
- Ad-hoc controls
- An organization is checking servers to ensure that unneeded services are disabled. What type of control is this?
- Corrective
- Detective
- Preventive
- Required
- An organization is implementing an intrusion detection system. What type of control is this?
- Corrective
- Detective
- Preventive
- Required
- An organization has created a comprehensive backup plan. What type of control is this?
- Corrective
- Detective
- Preventive
- Required
- Which of the following is an example of an administrative control?
- Policies and procedures
- Financial records
- System testing
- Audit
- What is required to ensure that employees are aware of security standards within an organization?
- Awareness training
- Technical controls
- Background checks
- Security policy
- An unauthorized user has gained access to data and viewed it. What has been lost?
- Confidentiality
- Availability
- Integrity
- Non-repudiation
- Which of the following best describes the keys used with asymmetric encryption techniques?
- 40-bit kit keys used for encryption and decryption
- Two keys known as a public key and a private key
- Two keys known as AES keys
- Two keys with asymmetric bit sizes
- Which of the following is used for identification and can be used for encryption?
- Certificate
- Certificate authority
- Digital signature
- Encryption key
- What is used to encrypt a digital signature?
- Sender’s public key
- Sender’s private key
- Recipient’s public key
- Recipient’s private key
- Risk mitigation planning starts with which of the following?
- Asset inventory
- Funding meeting
- Asset valuation
- Risk status
- Which of the following is not a valid consideration when planning risk mitigation?
- Potential loss of availability
- Potential loss of confidentiality
- Potential loss of costs
- Potential loss of integrity
- Identifying the criticality of business operations is a step in which of the following processes?
- Risk assessment
- Calculation of risk value
- Business impact analysis
- Cost-benefit analysis
- Which among the following determines the acceptable downtimes for critical business functions, processes, and IT service in a business impact analysis?
- Recovery time objective
- Disaster recovery plan
- Risk plan
- MAO
- In a business impact analysis, the loss of immediate sales and cash flow is an example of which of the following?
- Hidden costs
- Cost of doing business in a risky environment
- Direct cost
- Indirect cost
- Which of the following documents identifies an expected level of performance between organizations?
- Operational level agreement (OLA)
- Service level agreements (SLA)
- Shared Access agreement (SAA)
- All options are incorrect
- Of the following choices, what represents a function that is critical to an organization? If this fails, the organization will lose the ability to perform essential operations.
- Business impact analysis
- Business continuity plan
- Critical success factor
- Critical business function
- What device can filter Web page requests from users and only allow access to specific Web sites?
- Firewall
- Router
- Proxy server
- Spam filter
- Which of the following is a valid goal of a control or countermeasure?
- Eliminate risk
- Eliminate threats
- Eliminate vulnerabilities
- Reduce a vulnerability to an acceptable level
- Which of the following formulas can you use to determine the projected benefits of a control?
- R = T x V
- Loss before control – loss after control
- Loss after control – loss before control
- CBA – ROI
Step by Step Solution
★★★★★
3.59 Rating (160 Votes )
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below Which of the following is a type of risk mitigation security control Planned controls Planned controls are security measures that are part ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started