True or False? Installing antivirus software is a primary protection implemented in the User Domain of a typical IT infrastructure.
Which term is sometimes referred to as the maximum tolerable…
Which term is sometimes referred to as the maximum tolerable period of disruption (MTPD)?
True or False? Recommendations are rarely included in CBAs t…
True or False? Recommendations are rarely included in CBAs to enable readers to draw their own conclusions.
What are critical resources?
What are critical resources?
True or False? An implicit deny policy starts by allowing al…
True or False? An implicit deny policy starts by allowing all traffic through a firewall.
When performing threat assessments, it’s important to ensure…
When performing threat assessments, it’s important to ensure you understand the system or application you are evaluating. To understand a given system or application, you need to understand all of the following, except:
True or False? The following equation is used during a cost-…
True or False? The following equation is used during a cost-benefit analysis to determine projected benefits: Loss After Control – Loss Before Control
True or False? How an organization starts its risk mitigatio…
True or False? How an organization starts its risk mitigation process depends entirely on upper management preference.
True or False? If an in-place countermeasure needs to be upg…
True or False? If an in-place countermeasure needs to be upgraded or replaced, disable or remove the countermeasure until the new or upgraded control can be installed in order to best reduce vulnerabilities.
True or False? All in-place controls are permanent.
True or False? All in-place controls are permanent.