question archive 1) Which of the following statements are validated or verified via risk analysis? Each correct answer represents a complete solution

1) Which of the following statements are validated or verified via risk analysis? Each correct answer represents a complete solution

Subject:Computer SciencePrice: Bought3

1) Which of the following statements are validated or verified via risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Security is measurable.

B

Security is cost effective.

C

Security is responsive to threat.

D

Security completely protects an environment.

2.Which of the following represents accidental or intentional exploitations of vulnerabilities?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Breaches

B

Threat agents

C

Risks

D

Threat events

3.Question 3 :

STRIDE is often used in relation to assessing threats against applications or operating systems. Which of the following is not an element of STRIDE?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Spoofing

B

Disclosure

C

Repudiation

D

Elevation of privilege

4.Which of the following information does a business case include?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Risks and contingencies

B

Methods and assumptions

C

Recommendations

D

Testing strategies

5.Which of the following are the cost functions that are related to quantitative risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Annualized loss expectancy

B

Annualized rate of occurrence

C

Double profit gain

D

Single loss expectancy

6.Question 6 :

Which of the following access controls includes the hardware or software mechanisms used to manage access and provide protection for resources and systems?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Administrative

B

Technical

C

Physical

D

Corrective

7.Question 7 :

Which of the following elements of risk management eliminates vulnerabilities and protects the system against threats?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Exposure

B

Risk

C

Asset

D

Safeguard

8.Risk analysis provides to the higher management details necessary to determine risks that should be mitigated, transferred, and accepted. Which of the following statements are true of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

It uses public key cryptography to digitally sign records for a DNS lookup.

B

It facilitates slave DNS servers in transferring records from the master server to a slave server.

C

It recognizes risks, quantifies the impact of threats, and supports budgeting for security.

D

It adjusts the requirements and objectives of the security policy with business o

9.Which of the following is a software testing technique that provides invalid, unexpected, or random data to the inputs of a program?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

Timing

B

Stress

C

Fuzz

D

Recovery

10.Vulnerabilities and risks are evaluated based on their threats against which of the following?

This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.

A

One or more of the CIA Triad principles

B

Data usefulness

C

Due care

D

Extent of liability

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions