Reference no: EM132228288
1. During a SWOT analysis "Opportunities include, but are not limited the folllowing: __________________________________.
A. Changes in Technology, Government policies, Trends
B. Priorities, Talent, Government Polices
C. Process, Information, Talent
D Resources, Benchmarking, Standards
2. the term ______________________ is used to identify those assets, information, systems, or customer data that is critical to the functionality or survivability of an organization.
A. classified
B. proprietary
C. crown jewels
D. bullion
3. The four types of risk decisions, _______________________ focuses on fixing the deficiency that creates vulnerabilities and/or leveraging some form of compensation that controls your vulnerability.
a. Avoidance b. Transference c. Mitigation d. Acceptance
4. Identify the THREE major components recommended to build an effective Enterprise Risk Strategy?
A. Network Defense, Training, Incident Response
B. Strong Passwords, Multi-factor Authentication, Exercises
C. Policy, Procedure, Tactics
D. Processes, Technology, People
5. Which of the follow IS NOT a key component of a cyber security exercise?
A. Build a Business Continuity Management Plan
B. Establishing Working Relationships
C. Test Cybersecurity Policy Adherence
D. Gain Greater Organizational Credibility
6. When making prioritization decision organizations should include a cyber risk assessment, _________________________, improve employee training, and_______________________________.
A. Insider threat program, Castle Wall Program
B. Create a internet user policy, Create a remote access policy
C. conduct cyber exercises, Send phishing emails
D. Build budget base on risk assessment, develop and incident response plan