2.
To aid in the estimating the level of threat and vulnerability pair3.
To reduce the residual risk to an acceptable level4.
To repeat the risk management cycle for better resultsa.
1 and 2b.
1 and 3c.
2 and 4d.
3 and 4193. a.
The security categorization is used in two ways: (i) to determine which baseline security controls are selected and (ii) to aid in estimating the level of risk posed by a threat and vulnerability pair identified during the risk assessment step. Items 3 and 4 are part of the risk mitigation step.194. From an economies of scale viewpoint, the assessment, implementation, and monitoring activities of common security controls are
not conducted at which of the following levels?a.
Organizational levelb.
Individual system levelc.
Multiple systems leveld.
Functional level194. b.
Common security controls do not benefit at the individual system level because they benefit many systems and the principle of economies of scale is applicable here. Organizations can leverage controls used among multiple systems by designating them as common controls where assessment, implementation, and monitoring activities are conducted at an organizational level or by functional level or areas of specific expertise (e.g., human resources and physical security).195. Which of the following is
not a goal of the risk management evaluation and assessment process in ensuring that the system continues to operate in a safe and secure manner?a.
Implement a strong configuration management program.b.
Monitor the system security on a continuous basis.c.
Eliminate all potential threats, vulnerabilities, and risks to the system.d.
Track findings from the security control assessment process.195. c.
Because it is not practical or cost-effective to eliminate all potential threats, vulnerabilities, and risks to the system, management should consider only the possible threats, vulnerabilities, and risks to the system so that management can better prepare the system to operate in its intended environment securely, safely, and effectively.196. Which of the following statements is
not true? Risk management is the process that allows IT security managers to:a.
Balance the operational and economic cost of protective measuresb.
Achieve gains in mission-essential security capabilitiesc.
Protect IT systems and data that support the organization’s missiond.
Request funding to protect all systems, assets, and data in a comprehensive manner196. d.
Most organizations have a tight budget for IT security; therefore, IT security spending must be reviewed as thoroughly as other management decisions. It is not wise to protect all systems, assets, and data in a comprehensive manner. Risk management is the process that allows IT security managers to balance the operational and economic costs of protective measures to achieve mission-essential security capabilities and to protect the IT systems and data that support the organization’s mission.197. A plan of action and milestones document used in the security assessment and authorization process is
not based on which of the following?a.
Security impact analysisb.
Security controls assessmentc.
Business impact analysisd.
Continuous monitoring activities197. c.
A business impact analysis (BIA) is a part of business continuity planning (BCP) process, not security assessment and authorization process.The other three choices are part of the security assessment and authorization process. The plan of action and milestone (POA&M) document is developed to show the remedial actions to correct the weaknesses noted during the assessment of the security controls and the results from security impact analysis to reduce the weaknesses in the system. The POA&M document also contains continuous monitoring activities.
198. If an IT system has
not yet been designed, the search for vulnerabilities should not focus on which of the following?a.
Security policiesb.
Security proceduresc.
Planned security featuresd.
White papers