CIS 502 MENTOR Learn Do Live /cis502mentor.com CIS 502 MENTOR Learn Do Live /cis502mentor.com | Page 9
determine what additional controls may be needed to protect the
application and its databases. The best approach to performing
this risk assessment is:
•
•
7
CIA is known as
8
An organization has a strong, management-driven
model of security related activities such as policy, risk
management, standards, and processes. This model is better
known as:
•
9
•
•
The impact of a specific threat is defined as:
10
Annualized loss expectancy is defined as:
11
A security manager is performing a quantitative
risk assessment on a particular asset. The security manager
wants to estimate the yearly loss based on a particular threat.
The correct way to calculate this is::
•
12
An organization wishes to purchase an
application, and is undergoing a formal procurement process to
evaluate and select a product. What documentation should the
organization use to make sure that the application selected has
the appropriate security-related characteristics?
•
13
An organization suffered a virus outbreak when
malware was download by an employee in a spam message.
This outbreak might not have happened had the organization
followed what security principle: