Objective of an it risk management plan

Assignment Help Basic Computer Science
Reference no: EM131725510

1. What is the goal or objective of an IT risk management plan?

A) To determine the cost of implementing countermeasures.

B) To analyze hacker threats to match those threats to found system vulnerabilities.

C) To assist organizations in handling risk management for their IT infrastructure and treat all unknown risks.

D) To automatically shut down Internet access if hacking activity is discovered in real-time.

2. Which of the choices below are NOT one of the five fundamental components of an IT risk management plan?

A) Risk assessment

B) Risk discovery

C) Risk assessment

D) Risk monitoring

3. Risk planning is...

A) The process of using the cost-benefit analysis formulas to determine the greatest risk.

B) The process of analyzing the impact of storm damage on a facility.

C) The process of anticipating risk assessment costs.

D) The process of organizing how to conduct risk management

4. Which step is to be done first in performing risk management:

A) Risk identification

B) Risk assessment

C) Risk response such as avoidance

D) Risk planning

5. Which choice below indicates the action of measuring or determining how significant a risk is?

A) Risk mitigation

B) Risk assessment

C) Risk transfer

D) Cost Benefit Analysis

6. Which practice helps address risks?

A) Risk assessment

B) Risk deployment

C) Risk response

D) Risk avoidance

7. What ongoing practice helps track risk in real time?

A) Risk monitoring

C) Confidentiality, integrity, and availability

E) Risk assessment

D) Risk determinant

8. True or False: Once all of the steps in risk management are completed (identification, assessment, response, monitoring) the task of risk management is finished.

A) True

B) False

9. Why is it a good idea to establish a risk management plan team?

A) Because the team will be instrumental in completing the cost benefit analysis

B) Because the team will be needed to convince the executive management to complete the risk management assessment.

C) Because a team is needed to maintain momentum and keep the company excited about completing the risk management plan.

D) Because the team must be able to cover all of the IT domains. The scope and boundary of an IT risk management plan can be very large.

10. Of the 7 IT domains, which domain is the most difficult to identify, assess, and monitor risk in?

A) Workstation domain

B) User domain

C) WAN domain

D) Systems/Applications domain

11. In the lab work, how did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities help your IT risk management plan outline?

A) Because the textbook tracts along with the lab manual

B) Because the table in step 13 pointed out 21 risks, threats, and vulnerabilities which identified risk and their impacts. Risk response must focus on immediate action where needed, followed by a plan for ongoing response.

C) Because risk response is based on the findings from vulnerability analysis in the last chapter.

D) It was no help. There is no correlation.

Reference no: EM131725510

Questions Cloud

What was president lincolns view of slavery : What were some the challenges facing the nation with the reconstruction program as it pertains to slavery in the south? What was the objectives
Describe the valid mailbox identifiers : A user receives mail in which the To field specifies the string important-people. The mail was sent from a computer on which the alias important-people.
Calculate the average inventory cash conversion cycle ratios : Calculate the following cash conversion cycle ratios based on the financial statements using Microsoft Excel: Average inventory and Inventory turnover rate.
Matching confirmation password : a) As long as the user does not enter a valid password (see below) and a matching confirmation password:
Objective of an it risk management plan : 1. What is the goal or objective of an IT risk management plan? A) To determine the cost of implementing countermeasures.
Computer product aimed at kids worries you the most : So here is a tough question: Which computer product aimed at kids worries you the most? This is a tough question because, man, how do you pick one?
Create argument supporting the actions against organization : Create an argument supporting the actions against the organization and accounting firm, based on current professional code of conduct for independent auditors.
Explain briefly post and get method : 1. Explain briefly POST and GET method 2. Write the HTML code to use action in form tag use submit button using form submitting first name and last name
Create a measurable null and alternative hypothesis : Create a measurable null and alternative hypothesis - Identify the number of samples, whether they are independent, and what type of data will be collected

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Proton decay in intersecting brane models

We aim to show that in intersecting brane models there are no open string diagrams which represent proton decay into leptons and gauge bosons.

  Find the length of the best encoding

Give an O(nmk) algorithm to find the length of the best encoding. You may assume that every string has at least one encoding in terms of the table.

  Discuss differences between form and report

Discuss the differences between a form and a report. What characteristics make a form or report good/bad and effective/ineffective?

  Calculating the square of every number

Ask the user for a number between 2 and 1000. Using a loop, calculate the integer square root by calculating the square of every number

  What do you think are some of the main things

What do you think are some of the main things that contribute to slowing disk performance? How might you address these issues?

  Why is pki so vital in modern communications

Some say that with the development of systems such as IPSec, the role the CAs play in modern communication will diminish and eventually cease.

  Creates color from a given red and blue color channel value

Use the following descriptions/examples to match each function with the appropriate number of parameters and description, some choices may be used.

  Derive the lm curve

Derive the LM curve. Why is it upward sloping? Under what conditions will it be vertical and horizontal?

  Design of fundamental-mode sequential circuits

What assumption is made in the design of fundamental-mode sequential circuits, and why? How can essential hazards cause the fundamental mode to be violated?

  Information technology for operational

Provide and discuss an example of how a business function with which you are familiar with (e.g. sales, marketing, finance, operations/production, accounting, human resources) utilizes information Technology for operational and/or strategic purpos..

  Research objectives worksheet to reflect

Write a description of the project. Based on the scenario of the project, complete Research Objectives worksheet to reflect the required questions, sources of information, and more.

  Write a program that creates a random object

Write a program that creates a Random object with seed 1000 and displays the first 50 random integers between 0 and 100 using the nextInt(100) method.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd