1. Right Answer: B
Explanation: The risk monitoring and controlling is responsible for identifying new risks, determining the status of risks that may have changed, and determining which risks may be outdated in the project.Incorrect Answers:A: Risk planning creates the risk management plan and determines how risks will be identified, analyzed, monitored and controlled, and responded to.C: Risk identification is a process that identifies risk events in the project.D: Risk analysis helps determine the severity of the risk events, the risks' priority, and the probability and impact of risks.
2. Right Answer: B
Explanation: The Single Loss Expectancy (SLE) of this project will be $31,250.Single Loss Expectancy is a term related to Quantitative Risk Assessment. It can be defined as the monetary value expected from the occurrence of a risk on an asset. It is mathematically expressed as follows:Single Loss Expectancy (SLE) = Asset Value (AV) * Exposure Factor (EF) where the Exposure Factor represents the impact of the risk over the asset, or percentage of asset lost. As an example, if the Asset Value is reduced two third, the exposure factor value is .66. If the asset is completely lost, the Exposure Factor is 1.0. The result is a monetary value in the same unit as the Single LossExpectancy is expressed.Therefore,SLE = Asset Value * Exposure Factor= 125,000 * 0.25= $31,250Incorrect Answers:A, C, D: These are not SLEs of this project.
3. Right Answer: A,B,D
Explanation: The principles of access controls focus on availability, integrity, and confidentiality, as loss or danger is directly related to these three: Loss of confidentiality- Someone sees a password or a company's secret formula, this is referred to as loss of confidentiality. Loss of integrity- An e-mail message is modified in transit, a virus infects a file, or someone makes unauthorized changes to a Web site is referred to as loss of integrity. Loss of availability- An e-mail server is down and no one has e-mail access, or a file server is down so data files aren't available comes under loss of availability.
4. Right Answer: C
Explanation: Since the enterprise's internal and external environments are constantly changing, the risk environment is also highly dynamic, i.e., threats and vulnerabilities change over time. Hence KRIs need to be maintained to ensure that KRIs continue to effectively capture these changes.Incorrect Answers:A: Timely risk reporting is one of the business requirements, but is not the reason behind KRI maintenance.B: While most key risk indicator metrics need to be optimized in respect to their sensitivity, the most important objective of KRI maintenance is to ensure that KRIs continue to effectively capture the changes in threats and vulnerabilities over time.D: Avoiding risk is a type of risk response. Risk responses are based on KRI reporting.
5. Right Answer: A
Explanation: Program Management control comes under management class of controls, not technical.Program Management control is driven by the Federal Information Security Management Act (FISMA). It provides controls to ensure compliance with FISMA.These controls complement other controls. They don't replace them.Incorrect Answers:B, C, D: These controls comes under technical class of control.The Technical class of controls includes four families. These families include over 75 individual controls. Following is a list of each of the families in the Technical class: Access Control (AC): This family of controls helps an organization implement effective access control. They ensure that users have the rights and permissions they need to perform their jobs, and no more. It includes principles such as least privilege and separation of duties. Audit and Accountability (AU): This family of controls helps an organization implement an effective audit program. It provides details on how to determine what to audit. It provides details on how to protect the audit logs. It also includes information on using audit logs for non-repudiation.Identification and Authentication (IA): These controls cover different practices to identify and authenticate users. Each user should be uniquely identified. In other words, each user has one account. This account is only used by one user. Similarly, device identifiers uniquely identify devices on the network. System and Communications Protection (SC): The SC family is a large group of controls that cover many aspects of protecting systems and communication channels. Denial of service protection and boundary protection controls are included. Transmission integrity and confidentiality controls are also included.
Leave a comment