1. After undertaking a security assessment of a production system, the information security manager is MOST likely to:
A) inform the system owner of any residual risks and propose measures to reduce them. B) inform the development team of any residual risks, and together formulate risk reduction measures. C) inform the IT manager of the residual risks and propose measures to reduce them. D) establish an overall security program that minimizes the residual risks of that production system.
2. Mitigating technology risks to acceptable levels should be based PRIMARILY upon:
A) business process reengineering. B) business process requirement. C) legal and regulatory requirements. D) information security budget.
3. After assessing risk, the decision to treat the risk should be based PRIMARILY on:
A) availability of financial resources. B) whether the level of risk exceeds risk appetite. C) whether the level of risk exceeds inherent risk. D) the criticality of the risk.
4. Which of the following is the MOST important prerequisite to performing an information security risk assessment?
A) Classifying assets B) Determining risk tolerance C) Reviewing the business impact analysis D) Assessing threats and vulnerabilities
5. When preventative controls to appropriately mitigate risk are not feasible, which of the following is the MOST important action for the information security manager to perform?
A) Assess vulnerabilities. B) Manage the impact. C) Evaluate potential threats. D) Identify unacceptable risk levels.
Leave a comment