Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

A document used to track the progress of remediating identified risk.

12/11/2020 Client: papadok01 Deadline: 3 days

Question 1

1. Historically, a web server attached to the public Internet has a probability of being successfully attacked .90 in each year. To which of the following quantitative elements would this most likely relate?

2.

a.

EF

b.

ARO

c.

ALE

d.

SLE

1 points

Question 2

1. An organization that accepts credit card payments, would be expected to be compliant with which of the following laws or standards?

2.

a.

PCI-DSS

b.

HIPAA

c.

GLBA

d.

FISMA

1 points

Question 3

1. The act of taking advantage of a weakness within a system to gain unauthorized access is best described as a/an:

2.

a.

vulnerability

b.

exploit

c.

risk

d.

threat

1 points

Question 4

1. A risk handling technique in which the company chooses to do nothing about the risk, as the cost of implementing a contro would be more expensive than the impact if the risk were actualized is known as

2.

a.

Share or Transfer

b.

Mitigation

c.

Avoidance

d.

Acceptance

1 points

Question 5

1. Which of the following is not a U.S. Government risk management initiative or program?

2.

a.

ITIL

b.

US-CERT

c.

DHS’ NCCIC

d.

MITRE’s CVE List

1 points

Question 6

1. Under FISMA, how often are federal agencies expected to have an independent compliance audit to ensure that security controls are effectively managing risk?

2.

a.

Every three years

b.

Never

c.

Quarterly

d.

Annually

1 points

Question 7

1. Students at the University of the Cumberlands have some expectation of privacy afforded to them under which Federal Act?

2.

a.

SOX

b.

CIPA

c.

FERPA

d.

FISMA

1 points

Question 8

1. Which of the following NIST documents addresses how to effectively manage risk?

2.

a.

SP 800-55

b.

SP 800-41

c.

SP 800-53

d.

SP 800-30

1 points

Question 9

1. What are valid contents of a risk management plan?

2.

a.

Recommendations

b.

Scope

c.

Objectives

d.

All of the above

e.

POA&M

1 points

Question 10

1. The amount of money that a negative event will cost us, each time that it occurs.

2.

a.

Annualized Rate of Occurrence (ARO)

b.

Annual Loss Expectancy (ALE)

c.

Single Loss Expectancy (SLE)

d.

Exposure Factor (EF)

1 points

Question 11

1. You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will cost you $100,000, and that this might happen once in 5 years. A vendor wants to sell you a Data Loss Prevention (DLP) solution that would cost $30,000 per year. Which of the following is the best course of action?

2.

a.

Spend $25,000 on cyber insurance to transfer the risk

b.

Spend the $30,000 to mitigate the risk

c.

Spend whatever it takes to ensure that this data is safe. Its sensitive data, after all!

d.

Accept the risk

1 points

Question 12

1. A type of redundant site that has all of the hardware, software, telecommunication lines, an data already configured and ready to go in the event of a disaster is known as a/an

2.

a.

warm site

b.

alternate site

c.

cold site

d.

hot site

1 points

Question 13

1. Implementing an Intrustion Detection System that allows you to watch for hackers in real-time is an example of

2.

a.

Risk monitoring

b.

Vulnerabiity assessment

c.

Risk assessment

d.

Risk response

1 points

Question 14

1. A tool used to find open ports on a system is

2.

a.

Nessus

b.

Wireshark

c.

John the Ripper

d.

Nmap

1 points

Question 15

1. A risk assessment that uses numerical values to assess the likelihood and impact of a threat to a system is a ____________ risk assessment

2.

a.

Quantitative

b.

Qualitative

c.

Objective

d.

Subjective

1 points

Question 16

1. A method that shows a list of project tasks that must be completed on time so that the project is not delayed.

2.

a.

Risk Management Plan

b.

Milestone Plan Chart

c.

Critical Path Chart

d.

Gannt Chart

1 points

Question 17

1. A document used to track the progress of remediating identified risk.

2.

a.

POA&M, or risk register

b.

Risk Profile

c.

Vulnerability Assessment

d.

Risk Assessment

1 points

Question 18

1. This Act applies to financial oganizations

2.

a.

Sabanes-Oxley (SOX)

b.

FERPA

c.

GLBA

d.

FISMA

1 points

Question 19

1. Which of the following is not considered a method by which we would harden a server againsts attacks?

2.

a.

Enable a firewall

b.

Change default passwords

c.

Reverse engineer a patch to look for vulnerabilities

d.

Remove unused services

1 points

Question 20

1. This Act applies to security and privacy expectations of healthcare organizations.

2.

a.

HIPAA

b.

GLBA

c.

FERPA

d.

FISMA

1 points

Question 21

1. A policy that has been implemented that requires two different individuals perform different functions. An example is with a Certificate Authority that issues digital certificates where one role can only identify-proof the person the requesting the certificate and issue a request, and a different person can actually issue the digital certificate.

2.

a.

Job Rotation

b.

Need to Know

c.

Separation of Duties

d.

Acceptable Use

1 points

Question 22

1. If a hacker hacks in to a bank and transfers money out of one account into his account, which of the following security services was the one that was principally violated?

2.

a.

Integrity

b.

Confidentiality

c.

Availability

d.

Access Control

1 points

Question 23

1. The area inside the firewall is considered to be the

2.

a.

Secured Domain

b.

Workstation Domain

c.

User Domain

d.

LAN Domain

1 points

Question 24

1. Which of the following is an example of an intangible asset?

2.

a.

Sales database

b.

“Good will” or the branding that is associated with a well-liked product

c.

Server hardware

d.

Server software

1 points

Question 25

1. The possibility that a negative event will occur is known as a/an:

2.

a.

threat

b.

risk

c.

vulnerablity

d.

exploit

1 points

Question 26

1. A weak password, or a firewall that has been improperly configured, is considered a/an:

2.

a.

vulnerability

b.

threat

c.

risk

d.

exploit

1 points

Question 27

1. Which of the following is not a source that would be used to assess an organziation’s vulnerabilities?

2.

a.

System Logs

b.

Prior events

c.

Audits

d.

Acutuary tables

1 points

Question 28

1. Which of the following is the formula used to calculate the risk that remains after you apply controls?

2.

a.

Risk=Threat X Vulnerability

b.

Residual Risk = Total Risk - Controls

c.

ALE=SLExARO

d.

Total Risk=Thrat X Vulnerability X Assest Value

1 points

Question 29

1. Which of the following is not a fundamental component of an IT risk management plan?

2.

a.

Risk assessment

b.

Risk reporting

c.

Risk identification

d.

Risk planning

1 points

Question 30

1. You have a healthcare organization and would like medical personnel to be able to remotely log in to the network (the Remote Access Domain). Which of the following would be the best technique or tool that you would implement to help mitigate risk to this domain?

2.

a.

Implement automated server scanning

b.

Implement Web content filters

c.

Implement a VPN encrypted tunnel

d.

Implement automatic account lockout after 3 failed attempts

1 points

Question 31

1. Discuss one role that would participate in risk management and describe that one role’s resposnibilities with respect to risk management.

5 points

Question 32

1. In your own words, explain why it can be difficult to perform a quantitative risk assessment for a system. Do NOT copy in information or discuss what a quantitative risk assessment is. One, or two, short sentences is all that is required, or expected, for this answer.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Custom Coursework Service
Finance Homework Help
Peter O.
A+GRADE HELPER
Academic Mentor
Top Quality Assignments
Writer Writer Name Offer Chat
Custom Coursework Service

ONLINE

Custom Coursework Service

Hey, Hope you are doing great :) I have read your project description. I am a high qualified writer. I will surely assist you in writing paper in which i will be explaining and analyzing the formulation and implementation of the strategy of Nestle. I will cover all the points which you have mentioned in your project details. I have a clear idea of what you are looking for. The work will be done according to your expectations. I will provide you Turnitin report as well to check the similarity. I am familiar with APA, MLA, Harvard, Chicago and Turabian referencing styles. I have more than 5 years’ experience in technical and academic writing. Please message me to discuss further details. I will be glad to assist you out.

$55 Chat With Writer
Finance Homework Help

ONLINE

Finance Homework Help

I have a Master’s degree and experience of more than 5 years in this industry, I have worked on several similar projects of Research writing, Academic writing & Business writing and can deliver A+ quality writing even to Short Deadlines. I have successfully completed more than 2100+ projects on different websites for respective clients. I can generally write 10-15 pages daily. I am interested to hear more about the project and about the subject matter of the writing. I will deliver Premium quality work without Plagiarism at less price and time. Get quality work by awarding this project to me, I look forward to getting started for you as soon as possible. Thanks!

$55 Chat With Writer
Peter O.

ONLINE

Peter O.

Hello, I can assist you in writing attractive and compelling content on ganja and its movement globally. I will provide with valuable, informative content that you will appreciate. The content will surely hit your target audience. I will provide you with the work that will be according to the needs of the targeted audience and Google’s requirement.

$55 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

Greetings! I’m very much interested to work on this project. I have read the details properly. I am a Professional Writer with over 5 years of experience, therefore, I can easily do this job. I will also provide you with TURNITIN PLAGIARISM REPORT. You can message me to discuss the detail. Why me? My goal is to offer services to you that are profitable. I don’t want you to place an order once and that’s it. For me to be successful, I need you to come back and order again. Give me the opportunity to work on your project. I wish to build a long-term relationship with you. We can have further discussion in chat. Thanks!

$55 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

Hey, I have gone through your job posting and become very much interested in working with you.I can deliver professional content as per your requirements. I am a multi-skilled person with sound proficiency in the English language for being a native writer who worked on several similar projects of content writing and can deliver quality content to tight deadlines. I am available for both online and offline writing jobs with the promise of offering an incredibly responsive and supreme level of customer service. Thanks!

$55 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

Hey, I have gone through your job posting and become very much interested in working with you.I can deliver professional content as per your requirements. I am a multi-skilled person with sound proficiency in the English language for being a native writer who worked on several similar projects of content writing and can deliver quality content to tight deadlines. I am available for both online and offline writing jobs with the promise of offering an incredibly responsive and supreme level of customer service. Thanks!

$55 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Micro56 - 1.4 Week One Reflection - Lyme Disease - Security infrastructure design document - L atm to kj - Excel chapter 9 - Ato private health insurance rebate tiers - Which of the following is a nonvascular plant - Map of australian deserts - The strategic management process is mcq - Modified monash model map wa - Project management simulation scope resources and schedule - Project overview statement example - What types of legal claims could Paula make against Capstone Corporation and Freddy? - Gibbs reflective cycle example essay business - Soap note assignment - The watch company manufactures trendy - Is evolution a good explanation for psychological concepts - Main characters in breakfast club - Measuring the speed of light with a microwave - How to ask about general symptoms on shadow health - Audience analysis worksheet example - Strayer university mascot - Macquarie uni orientation 2021 - When was the blind side set - Where was bill henson born - Tata communications emerging markets growth strategy - 1 page summary - Ford motor company six sigma case study - Cengage diet and wellness plus - C-leg 4 battery life - California Wildfires Affect On the Environment - Sample invitation letter to journalist - Studies of religion syllabus stage 6 - Climate change essay - Robot safety and robot safeguarding - Flow chart symbol meanings - International Trade - MK405 Unit 7 Discussion - The diagram shows a zn mno2 koh alkaline dry cell - Www whitehouseblackmarket store account associate registration jsp - Presidential Agendas - Nanda nursing diagnosis for marfan syndrome - Post-Tania - Help plz! - Living in a risk society unimelb - Central homeopathic research institute noida - Gwen harwood mother who gave me life poem - Tlmt 601 - Discuss what talent management is and why it is a consideration addressed by a growing number of employers. - The second largest continent - Which of the following is a capital budgeting decision - Error code e1-0-1 centrelink - Brisbane ranges 4wd tracks - Johnson and johnson tylenol recall ethics - Primis ebooks - Approaches to Black Studies - Green company's common stock is currently selling - Oxidation state of complex ions - Week 8 nurs500 - Www thevouchergarden co uk - How does multitasking confuse the resource availability of project team personnel? - Swimming teacher job description - Is social business working out - Spanish conquest of the aztecs primary sources - Anne moody coming of age in mississippi pdf - Application Security - Call +91-9924492424- Love Vashikaran -- Specialist Baba Ji. - Why do paleolithic female figurines vastly outnumber those representing males? - Ida jean orlando theory ppt - Hire a professional team of resume writers. - Health education west midlands - Create an algorithm to describe the prime steps to complete the task that would guide the robot to fulfill the job. - Windows 7 pinyin input - Identifying innovation roles - Why did the pilgrims owe squanto gratitude - Apa code of ethics 2017 - Mount alexander animal shelter - Pivot table data crunching microsoft excel 2010 pdf - Exploring creation with physical science module 3 study guide answers - Wk 5 - Apply: Policies Review [due Mon] - Section 131 minute maid park - Great northern super crisp dan murphy - Enacted and unenacted law - Disadvantages of money market hedge - Ozito rotary tool rtp 163 - Request for proposal template australia - Journal of Criminal Justice _ Week 6. - Classroom observation powerpoint presentation - Ecology short answer questions - How to cite aca code of ethics in apa paper - Coldfusion 11 update 11 - Douglas mcdonald company's balance sheet - Under armour sustainability report 2018 - Performance appraisal standards for hospitals - The Social Perspective - Uct student housing office - Anglo saxon and medieval periods - Homework Question - Leaf rubbing lesson plan