Question: Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is

Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing? Question 1 options: Policy Standard Guideline Procedure Question 2 (2 points) Kim is the risk manager for a large organization. She is evaluating whether the organization should purchase a fire suppression system. She consulted a variety of subject matter experts and determined that there is a 1 percent chance that a fire will occur in a given year. If a fire occurred, it would likely cause $2 million in damage to the facility, which has a $10 million value. Given this scenario, what is the exposure factor? Question 2 options: 1 percent 10 percent 20 percent 50 percent Question 3 (2 points) Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered? Question 3 options: Threat Vulnerability Risk Impact Question 4 (2 points) Alan is the security manager for a mid-sized business. The company has suffered several serious data losses when mobile devices were stolen. Alan decides to implement full disk encryption on all mobile devices. What risk response did Alan take? Question 4 options: Reduce Transfer Accept Avoid Question 5 (2 points) What is NOT one of the three tenets of information security? Question 5 options: Confidentiality Integrity Safety Availability Question 6 (2 points) Authorization is the process of granting rights to use an organization's IT assets, systems, applications, and data to a specific user. Question 6 options: True False Question 7 (2 points) Implementing and monitoring risk responses are part of the risk management process. Question 7 options: True False Question 8 (2 points) Jake has been asked to help test the business continuity plan at an offsite location while the system at the main location is shut down. He is participating in a parallel test. Question 8 options: True False Question 9 (2 points) The tools for conducting a risk analysis can include the documents that define, categorize, and rank risks. Question 9 options: True False Question 10 (2 points) Risk refers to the amount of harm a threat exploiting a vulnerability can cause. Question 10 options: True False

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!