Objective of an it risk management plan

Assignment Help Basic Computer Science
Reference no: EM131725510

1. What is the goal or objective of an IT risk management plan?

A) To determine the cost of implementing countermeasures.

B) To analyze hacker threats to match those threats to found system vulnerabilities.

C) To assist organizations in handling risk management for their IT infrastructure and treat all unknown risks.

D) To automatically shut down Internet access if hacking activity is discovered in real-time.

2. Which of the choices below are NOT one of the five fundamental components of an IT risk management plan?

A) Risk assessment

B) Risk discovery

C) Risk assessment

D) Risk monitoring

3. Risk planning is...

A) The process of using the cost-benefit analysis formulas to determine the greatest risk.

B) The process of analyzing the impact of storm damage on a facility.

C) The process of anticipating risk assessment costs.

D) The process of organizing how to conduct risk management

4. Which step is to be done first in performing risk management:

A) Risk identification

B) Risk assessment

C) Risk response such as avoidance

D) Risk planning

5. Which choice below indicates the action of measuring or determining how significant a risk is?

A) Risk mitigation

B) Risk assessment

C) Risk transfer

D) Cost Benefit Analysis

6. Which practice helps address risks?

A) Risk assessment

B) Risk deployment

C) Risk response

D) Risk avoidance

7. What ongoing practice helps track risk in real time?

A) Risk monitoring

C) Confidentiality, integrity, and availability

E) Risk assessment

D) Risk determinant

8. True or False: Once all of the steps in risk management are completed (identification, assessment, response, monitoring) the task of risk management is finished.

A) True

B) False

9. Why is it a good idea to establish a risk management plan team?

A) Because the team will be instrumental in completing the cost benefit analysis

B) Because the team will be needed to convince the executive management to complete the risk management assessment.

C) Because a team is needed to maintain momentum and keep the company excited about completing the risk management plan.

D) Because the team must be able to cover all of the IT domains. The scope and boundary of an IT risk management plan can be very large.

10. Of the 7 IT domains, which domain is the most difficult to identify, assess, and monitor risk in?

A) Workstation domain

B) User domain

C) WAN domain

D) Systems/Applications domain

11. In the lab work, how did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities help your IT risk management plan outline?

A) Because the textbook tracts along with the lab manual

B) Because the table in step 13 pointed out 21 risks, threats, and vulnerabilities which identified risk and their impacts. Risk response must focus on immediate action where needed, followed by a plan for ongoing response.

C) Because risk response is based on the findings from vulnerability analysis in the last chapter.

D) It was no help. There is no correlation.

Reference no: EM131725510

Questions Cloud

What was president lincolns view of slavery : What were some the challenges facing the nation with the reconstruction program as it pertains to slavery in the south? What was the objectives
Describe the valid mailbox identifiers : A user receives mail in which the To field specifies the string important-people. The mail was sent from a computer on which the alias important-people.
Calculate the average inventory cash conversion cycle ratios : Calculate the following cash conversion cycle ratios based on the financial statements using Microsoft Excel: Average inventory and Inventory turnover rate.
Matching confirmation password : a) As long as the user does not enter a valid password (see below) and a matching confirmation password:
Objective of an it risk management plan : 1. What is the goal or objective of an IT risk management plan? A) To determine the cost of implementing countermeasures.
Computer product aimed at kids worries you the most : So here is a tough question: Which computer product aimed at kids worries you the most? This is a tough question because, man, how do you pick one?
Create argument supporting the actions against organization : Create an argument supporting the actions against the organization and accounting firm, based on current professional code of conduct for independent auditors.
Explain briefly post and get method : 1. Explain briefly POST and GET method 2. Write the HTML code to use action in form tag use submit button using form submitting first name and last name
Create a measurable null and alternative hypothesis : Create a measurable null and alternative hypothesis - Identify the number of samples, whether they are independent, and what type of data will be collected

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Five assumptions of free market capitalism

List and describe at least five assumptions of free market capitalism.

  Revisiting the deployment diagram

The only thing constant in the information technology landscape is that things always change. Such is the case for the textbook ordering system you examined in the previous unit.

  What will your monthly payments be

You want to buy a new sports coupe for $93,500, and the finance office at the dealership has quoted you an APR of 7.5 percent for a 48 month loan to buy the car

  Determining the speed of a computer

Explain the role of each of the following in determining the speed of a computer: RAM, Clock speed and Data on hard disk

  Find an irreducible cover for this set of fds

What does it mean to say that two sets S1 and S2 of FDs are equivalent?

  Legal issues in information security and incident response

The news media often publicizes cyber crime activities. Discuss one of the cyber crimes you have heard about, explaining the crime along with how it was discovered and investigated? What was the outcome? If the investigation is ongoing, based on t..

  Static methods for processing an array of marks

For this task you will create a class containing a number of static methods for processing an array of marks, which are scores in a test. Each mark is an integer in the range 0 to 100 inclusive. On the Interact site for this subject, you will be p..

  What is the deadweight loss

Refer to Scenario 1. At the profit maximizing level of output, what is the deadweight loss?

  When does r display character vectors/strings without quotes

when does R display character vectors/strings without quotes?

  Do you think the appropriate conditions are met

Back to school, again. Based on the 74% national retention rate described in Exercise 17, does a college where 522 of the 603 freshman returned the next year as sophomores have a right to brag that it has an unusually high retention rate? Explain.

  Create an application that calculate your daily driving cost

(Car-Pool Savings Calculator) Research several car-pooling websites. Create an application that calculates your daily driving cost.

  P needed to raise the column and the equilibrium

The contacting surface between A and D is smooth.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd