What is the overall objective of an it risk assessment

Assignment Help Basic Computer Science
Reference no: EM131741940

1. What is the overall objective of an IT risk assessment?

a) To assist IT management in establishing a budget for countermeasures

b) To assist an organization in identifying risks and impacts

c) To convince the executive management on the importance of an Intrusion Detection System (IDF)

d) To determine which brand of firewall software to install on the CEO's laptop when traveling

2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure ?

a) It is difficult to setup the rules in a firewall based on quantitative statistics and numbers

b) A quantitative analysis is subjective and is based on the opinions of experts which is time consuming to collect

c) A quantitative analysis requires IBM's SPSS statistical software which is $2500 per copy and is too expensive

d) Obtaining the correct information on liabilities and collecting accurate data cost elements is difficult and time consuming

3. What would be a valid reason to assign a "1 - CRITICAL" risk factor to a found vulnerability?

a) It was determined that the vulnerability could cause employees to open emails with a possible virus.

b) It was determined that the vulnerability could impact the time it would take to stock incoming parts in the warehouse.

c) It was determined that the vulnerability could be the greatest risk to the organization

d) It was determined that the vulnerability could close the factory for a couple of hours.

4. Three vulnerabilities were determined for an organization:

Employee Productivity

Compliance shortcomings

Vulnerability in protecting Intellectual Property

You are about to assign Risk factors "1" , "2" , and "3" to these vulnerabilities to present to management. How would you prioritize these risks ?

a) 1- Keeping Employee Productivity up is the most serious risk, then 2-Compliance, then 3- Intellectual Property

b) 1- Protecting Intellectual Property is the most serious risk, then 2-Employee Productivity, then 3- Compliance

c) 1-Compliance is the most serious risk, then 2-Intellectual Property, then 3-Employee Productivity

d) All three are equally important and should have equal rating factors.

5) A married man gets a new job in a company. After three months, he meets a younger woman in the finance department and they begin having an affair. The affair carries on openly in the workplace over the course of 6 months, then begins to sour when she discovers that he is already married. The relationship quickly changes to bickering and name-calling while at work. The woman eventually breaks off the relationship, quits her job, and sues the company for fostering a hostile work environment. True or False: Of the seven IT infrastructure domains, the USER domain was most at risk.

a) True

b) False

6) A young woman waits in a local deli to hear the coffee order come in by phone from the law firm close by. The law firm places the same order every morning. A delivery boy sets out to deliver the coffee but is met outside by the woman near the front of the firm's building. The woman smiles and claims she is one of the lawyers; she offers to bring the coffee upstairs for him and gives him a generous $10 tip. The boy shrugs, takes the money, gives her the coffee order, and heads back to the deli.

The woman enters the firm's lobby and tells the two security guards that she is the delivery girl from the deli and has the coffee order. She chats casually with one guard while she covertly peers over the shoulder of the 2nd guard and watches him enter the security codes to access the elevators on the lobby computer. The first guard takes the coffee and gives her a $2 tip. She gives them a big, friendly smile, says thank you, waves goodbye, and leaves the building.

10 days later she returns to the law firm at night, breaks into the building, accesses the elevators using the lobby computer, and breaks into the offices upstairs to steal vital case information.

Which domain was exploited by the woman perpetrator ?

a) The LAN domain

b) The User domain and the Remote Access domain

c) The Workstation domain

d) The System/Application domain

7) A pharmaceutical sales person has a route of doctor's offices that he visits to see if they need to replenish any of the drug supplies in the offices. He carries with him a tablet with a cellular data plan from which he can place orders. The transactions are processed in real-time via secure browser over the Internet to access the sales-order entry system. Which of the seven domains would have the primary focus of secure communications?

a) The User domain and Systems/Application domain

b) The WAN domain and the Systems/Application domain

c) The LAN-to-WAN doman

d) The Remote Access domain

8) Which of the threats below is primarily a risk to the Systems/Application domain ?

a) A fire destroys the primary data center

b) There is a major network outage

c) A hacker accesses the internal network from a public Internet cafe.

d) None of the above

9) Which of the following is NOT a LAN-to-WAN domain risk ?

a) VPN tunnel hardware is obsolete and needs upgrading to modern security levels

b) Weak ingress & egress traffic filtering between the internal network and the Internet

c) DDoS attack on DMZ and email server

d) Unauthorized access to business-owned workstations

10) Loss of production data is a Workstation domain risk.

a) True

b) False

11) Network performance that is slowed down by excessive Internet traffic is a top-level (1-rating) critical business risk ?

a) True

b) False

Reference no: EM131741940

Questions Cloud

Why might a writer feel compelled to write about literature : Why might a writer feel compelled to write about literature? How does it benefit us personally and or perfessionally?
Write research paper on team management : Write a research paper on team management?
What type of hypothesis test would fox use : As the study is described, what are the independent and dependent variables? For nominal variables, state the levels.
Define how does the end of one myth preface the myth : how does the end of one myth preface the myth following it? How does it set up the story
What is the overall objective of an it risk assessment : 1. What is the overall objective of an IT risk assessment? a) To assist IT management in establishing a budget for countermeasures
Research paper on sir gawains behavior in the poem : Writing a research paper on Sir Gawain's behavior in the poem Sir Gawain and the Green knight using psychology paper has to be 1800 words
Organic organization versus mechanistic organization : Compare and contrast the elements of an organic organization versus mechanistic organization
Standard deviation for income in the state of wyoming : A city employee locates a U.S. Census report that includes the mean and standard deviation for income in the state of Wyoming and then takes a random sample.
What are some challenges you might anticipate and why : What are some challenges you might anticipate and why? Describe the work you are currently involved in for which you might pursue funding.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find a hospital in your area

Go to www.jointcommission.org. Click on Quality Check and find a hospital in your area. View the accreditation quality report. Describe what you have learned about this hospital. How could health care consumers use this site in deciding where to s..

  John bought a new automobile

John bought a new automobile. Shortly after he purchased the vehicle, he was involved in an accident and his airbag failed to deploy.

  Internet research to learn more about web-based companies

You can use a search engine, or start by visiting the Web sites of publications such as Forbes, Fortune Magazine, Business Week, or The Wall Street Journal, among others.

  Implement the counting bag adt

A Counting Bag ADT is just like the Bag ADT but includes the numOf(item) operation, which returns the number of occurrences of the given item in the bag. Implement the Counting Bag ADT and defend your selection of data structure.

  Determines the sex of an unborn child

Also describe as to, who determines the sex of an unborn child? Mention whether temperature has a role in sex determination.

  How many numbers they want to have from that number

Modify the previous program to ask the user a number to start and how many numbers they want to have from that number.

  Contemporary enterprises have a wide array of network

Contemporary enterprises have a wide array of network and platform security tools from which to choose, and as we have seen in this course there is substantial overlap in the capabilities of different categories of tools such as firewalls, IDS, anti-..

  Write function called check factor that takes in two number

Write a function called check Factor that takes in two numbers, and checks if they are divisible, i.e. if the first is divisible by the second. You may assume that both numbers are positive. Your function should return a logical value, true or fal..

  Was this project terminated through political means

The authors of this article maintain that politics is an important element of project implementation. Do you agree? Was this project terminated through "political" means?

  Create a projected profits worksheet using the template

Create a projected profits worksheet using the template available in D2L under the content tab entitled Excel Assignment 1 Template. In cell B15, calculate Total Income. Format as currency with 2 decimal places.

  Determine the power rating of the electric resistance

The rate of heat loss from the air in the duct is estimated to be 300 W. Determine the power rating of the electric resistance heating element.

  Find the difference equation that characterizes this system

Determine a realization of the system that requires the minimum possible amount of memory.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd