Professional Documents
Culture Documents
Cuestionario, 10 preguntas
10/10 puntos (100%)
¡Felicitaciones! ¡Aprobaste!
Pregunta 1
Correcto
1/1
Punto
1. Pregunta 1
Using certain types of unauthorized software may represent the _______ of risk.
Why
How
What
Correcto
Correct!
Pregunta 2
Correcto
1/1
Punto
2. Pregunta 2
Incorrectly configuring a file may represent the ______ of risk.
When
How
Correcto
Correct!
Why
Pregunta 3
Correcto
1/1
Punto
3. Pregunta 3
The _______ of risk deals with timing of events.
How
When
Correcto
Correct!
What
Pregunta 4
Correcto
1/1
Punto
4. Pregunta 4
The ____________ of risk looks at trusted vs untrusted networks.
Why
Where
Correcto
Correct!
What
Pregunta 5
Correcto
1/1
Punto
5. Pregunta 5
You may have this type of risk if people within your organization want to use unsanctioned software.
How
Why
Correcto
Correct!
What
Pregunta 6
Correcto
1/1
Punto
6. Pregunta 6
The _____ step of Risk Assessments deals with identifying controls that need to be placed on the information
system.
Select
Correcto
Correct!
Implement
Assess
Pregunta 7
Correcto
1/1
Punto
7. Pregunta 7
The _____ step of Risk Assessments deals with putting the selected controls in place.
Implement
Correcto
Correct!
Report
Assess
Pregunta 8
Correcto
1/1
Punto
8. Pregunta 8
The _____ step of Risk Assessments deals with understanding how to identify the risk first.
Select
Categorize
Correcto
Correct!
Assess
Pregunta 9
Correcto
1/1
Punto
9. Pregunta 9
The _____ step of Risk Assessments deals with making sure the implemented controls are actually working as
intended.
Implement
Assess
Correcto
Correct!
Categorize
Pregunta 10
Correcto
1/1
Punto
10. Pregunta 10
The _____ step of Risk Assessments deals with accepting or mitigating the risk.
Assess
Authorize
Correcto
Correct!
Categorize