determine what additional controls may be needed to protect the application and its databases . The best approach to performing this risk assessment is :
• 7 CIA is known as :
• 8 An organization has a strong , managementdriven model of security related activities such as policy , risk management , standards , and processes . This model is better known as :
• 9 The impact of a specific threat is defined as :
• 10 Annualized loss expectancy is defined as :
• 11 A security manager is performing a quantitative risk assessment on a particular asset . The security manager wants to estimate the yearly loss based on a particular threat . The correct way to calculate this is ::
• 12 An organization wishes to purchase an application , and is undergoing a formal procurement process
determine what additional controls may be needed to protect the application and its databases . The best approach to performing this risk assessment is :
• 7 CIA is known as :
• 8 An organization has a strong , managementdriven model of security related activities such as policy , risk management , standards , and processes . This model is better known as :
• 9 The impact of a specific threat is defined as :
• 10 Annualized loss expectancy is defined as :
• 11 A security manager is performing a quantitative risk assessment on a particular asset . The security manager wants to estimate the yearly loss based on a particular threat . The correct way to calculate this is ::
• 12 An organization wishes to purchase an application , and is undergoing a formal procurement process