• 6 A security manager needs to perform a risk assessment on a critical business application, in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is:
• 7 CIA is known as:
• 8 An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as:
• 9 The impact of a specific threat is defined as:
• 10 Annualized loss expectancy is defined as:
• 11 A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is::
• 12 An organization wishes to purchase an application, and is undergoing a formal procurement process to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics?
• 13 An organization suffered a virus outbreak when malware was download by an employee in a spam message.
• 6 A security manager needs to perform a risk assessment on a critical business application, in order to determine what additional controls may be needed to protect the application and its databases. The best approach to performing this risk assessment is:
• 7 CIA is known as:
• 8 An organization has a strong, management-driven model of security related activities such as policy, risk management, standards, and processes. This model is better known as:
• 9 The impact of a specific threat is defined as:
• 10 Annualized loss expectancy is defined as:
• 11 A security manager is performing a quantitative risk assessment on a particular asset. The security manager wants to estimate the yearly loss based on a particular threat. The correct way to calculate this is::
• 12 An organization wishes to purchase an application, and is undergoing a formal procurement process to evaluate and select a product. What documentation should the organization use to make sure that the application selected has the appropriate security-related characteristics?
• 13 An organization suffered a virus outbreak when malware was download by an employee in a spam message.