Sec+ Chp 1

  1. You are using encryption technology in an attempt to protect a file containing customer credit card numbers from unauthorized access. What information security goal are you pursuing?


    A. Confidentiality

    B. Integrity

    C. Disclosure

    D. Availability
    A. Correct: Confidentiality controls protect information against unauthorized access.Preventing intruders from accessing the credit card file is an example of a confidentialitycontrol.
  2. You are performing a risk assessment of an organization and decide that the likelihood of a particular risk materializing is “low.” What type of risk assessment are you performing?

    A. Operational

    B. Quantitative

    C. Technical

    D. Qualitative
    D. Correct: Qualitative risk assessments use subjective categories, such as “low,”“moderate,” and “high,” to describe the likelihood and impact of risks.
  3. You are conducting a quantitative risk assessment for an organization to identify the risk of a fire in a data center. The data center is valued at $10 million and you expecta fire to occur once every 50 years that will damage three-quarters of the data center(including equipment). What is your exposure factor?



    A. Correct: The exposure factor is the proportion of the asset that will be damaged inthe event of a fire. In this case, that is 75 percent.
  4. You are conducting a quantitative risk assessment for an organization to identify the risk of a fire in a data center. The data center is valued at $10 million and you expecta fire to occur once every 50 years that will damage three-quarters of the data center(including equipment). What is your annualized loss expectancy?




    A. Correct: The annualized loss expectancy is calculated as the product of the single loss expectancy and the annualized rate of occurrence. The SLE is the asset value($10 million) multiplied by the exposure factor (75 percent), or $7.5 million. The ARO is once every 50 years, or 0.02. The ALE is, therefore, $7,500,000 × 0.02 or$150,000.
  5. You are evaluating methods to manage the risk posed to your organization by hackers and decide that you will pursue a strategy of aggressively prosecuting anyone who attempts to break into your systems. What risk management strategy are you implementing?



    C. Correct: Prosecuting attackers reduces the likelihood that others will try to attackyou and is an example of risk deterrence.
  6. You are conducting a lessons-learned session to identify gaps in your response to aninformation security incident. What phase in the incident response life cycle are youparticipating in?



    C. Correct: Conducting a lessons-learned session to identify potential improvements in the incident response process is an important part of the post-incident activity phase.
Author
qaustin92
ID
258556
Card Set
Sec+ Chp 1
Description
Sec+
Updated