Language:EN
Pages: 4
Rating : ⭐⭐⭐⭐⭐
Price: $10.99
Page 1 Preview
residual risk total risk controls

Residual risk total risk controls

Question 1
Which of the following is the formula used to calculate the risk that remains after you apply controls?

a. Total Risk=Threat X Vulnerability X Assest Value
b. Risk=Threat X Vulnerability
c. Residual Risk = Total Risk - Controls
d. ALE=SLExARO?

a. SLE
b. EF
c. ARO
d. ALE
https://quizlet.com/30268528/principles-of-information-security-chapter-4-flash-cards/

annualized rate of occurrence (ARO)
how often a specific type of attack is expected to occur

Question 8
You are a very small company that sells healthcare insurance plans. You estimate that the breach of your customer database will cost you $200,000, and that this might happen once in 5 years. A vendor wants to sell you a Data Loss Prevention (DLP) solution that would cost $50,000 per year. Which of the following is the best course of action?

a. Accept the risk,
b. Spend whatever it takes to ensure that this data is safe.

Question 15
This regulation applies to how institutions handle the privacy of your student records at the University.

a. FERPA
b. CIPA
c. GLBA
d. HIPAA
Question 16
This Act applies to security and privacy expectations of healthcare organizations.

Answer:

Qualitative risk assessment: It goes deeper in its assessment and includes additional factors and other threat vectors.

You are viewing 1/3rd of the document.Purchase the document to get full access instantly

Immediately available after payment
Both online and downloadable
No strings attached
How It Works
Login account
Login Your Account
Place in cart
Add to Cart
send in the money
Make payment
Document download
Download File
img

Uploaded by : Nieves Cuenca Martínez

PageId: DOC94909CD