what quantitative risk analysis is?
You are the project manager for your organization. You are preparing for the quantitative risk
analysis. Mark, a project team member, wants to know why you need to do quantitative risk
analysis when you just completed qualitative risk analysis. Which one of the following statements
best defines what quantitative risk analysis is?
Which of the following would be the MOST important goal of an information security governance program?
Which of the following would be the MOST important goal of an information security governance
program?
Which of the following BEST describes the utility of a risk?
Which of the following BEST describes the utility of a risk?
which of the following is the MOST costeffective test of the DRP?
An organization having a number of offices across a wide geographical area has developed a
disaster recovery plan (DRP). Using actual resources, which of the following is the MOST
costeffective test of the DRP?
Which of the following is a continuity plan test that uses actual resources to simulate a system crash to cost
Which of the following is a continuity plan test that uses actual resources to simulate a system
crash to cost-effectively obtain evidence about the plan’s effectiveness?
What risk identification method could you use?
Your project spans the entire organization. You would like to assess the risk of the project but are
worried that some of the managers involved in the project could affect the outcome of any risk
identification meeting. Your worry is based on the fact that some employees would not want to
publicly identify risk events that could make their supervisors look bad. You would like a method
that would allow participants to anonymously identify risk events. What risk identification method could you use?
which of the following?
Relationships among security technologies are BEST defined through which of the following?
Which of the following aspect of monitoring tool ensures that the monitoring tool has the ability to keep up w
Which of the following aspect of monitoring tool ensures that the monitoring tool has the ability to
keep up with the growth of an enterprise?
Which of the following audit recommendations should the IS auditor suggest?
The IS auditor learns that when equipment was brought into the data center by a vendor, the
emergency power shutoff switch was accidentally pressed and the UPS was engaged. Which of
the following audit recommendations should the IS auditor suggest?
_________models address specifications, requirements, design, verification and validation, and maintenance act
CORRECT TEXT
Fill in the blank with an appropriate phrase.
_________models address specifications, requirements, design, verification and validation, and
maintenance activities.