What should you do with these identified risk events?
You and your project team are identifying the risks that may exist within your project. Some of the
risks are small risks that won’t affect your project much if they happen. What should you do with
these identified risk events?
What type of control is an intrusion detection system (IDS)?
You are the project manager of your enterprise. You have introduced an intrusion detection
system for the control. You have identified a warning of violation of security policies of your
enterprise. What type of control is an intrusion detection system (IDS)?
What are the functions of audit and accountability control?
What are the functions of audit and accountability control?
Each correct answer represents a complete solution. Choose all that apply.
Which among the following acts as a trigger for risk response process?
Which among the following acts as a trigger for risk response process?
What is the value of exposure factor if the asset is lost completely?
What is the value of exposure factor if the asset is lost completely?
what risk response?
Your project is an agricultural-based project that deals with plant irrigation systems. You have
discovered a byproduct in your project that your organization could use to make a profit. If your
organization seizes this opportunity it would be an example of what risk response?
Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO), and Annual l
Which of the following is true for Single loss expectancy (SLE), Annual rate of occurrence (ARO),
and Annual loss expectancy (ALE)?
Which of the following statements are true for enterprise’s risk management capability maturity level 3
Which of the following statements are true for enterprise’s risk management capability maturity
level 3 ?
Which of the following role carriers is accounted for analyzing risks, maintaining risk profile, and risk-awa
Which of the following role carriers is accounted for analyzing risks, maintaining risk profile, and
risk-aware decisions?
What is this poor quality of password and unsafe transmission refers to?
You are using Information system. You have chosen a poor password and also sometimes
transmits data over unprotected communication lines. What is this poor quality of password and
unsafe transmission refers to?