The other three choices deal with efficiency and implementation metrics. Audit records reviewed deals with efficiency metrics, whereas audit log findings and automated mechanisms deal with implementation metrics.
Effectiveness or efficiency metrics measure the results of security services delivery (i.e., monitors the results of security controls implementation).
Implementation metrics measure the results of implementation of security policies, procedures, and controls (i.e., demonstrates progress in implementation efforts).
224. Which of the following IT security metrics focuses on impact?
a.
Percentage of information system security personnel that have received security trainingb.
Percentage of systems compliant with the baseline configurationc.
Sum of costs of each incident within the reporting periodd.
Percentage of configuration changes documented in the latest baseline configurationImpact metrics measure the results of business or mission impact of security activities and events (i.e., provides the most direct insight into the value of security to the firm). Implementation metrics measure the results of implementation of security policies, procedures, and controls (i.e., demonstrates progress in implementation efforts).
225. IT security training provides which of the following levels?
a.
Datab.
Informationc.
Knowledged.
InsightScenario-Based Questions, Answers, and Explanations
Use the following information to answer questions 1 through 9.
Risk management is a major priority of the SPK Company. The following data has been collected for one asset in the company: Natural threats are realized once every five years. The total asset value is $1,000,000. Every time a threat causes damage, it cost the company an average of $100,000. The company has the choice of getting insurance for $10,000 per year or moving to a new location that will be a onetime cost of $35,000. The SPK priorities in the risk management strategy are accuracy and long-term repeatability of process.
1. What can be done with the residual risk?
a.
It can be either assigned or accepted.b.
It can be either identified or evaluated.c.
It can be either reduced or calculated.d.
It can be either exposed or assessed.2. Which of the following is
a.
Assetsb.
Threatsc.
Vulnerabilitiesd.
Countermeasures3. Security safeguards and controls cannot
a.
Risk reductionb.
Risk avoidancec.
Risk transferd.
Risk analysis4. Selection and implementation of security controls refer to which of the following?
a.
Risks analysisb.
Risk mitigationc.
Risk assessmentd.
Risk management5. Which of the following is closely linked to risk acceptance?
a.
Risk detectionb.
Risk preventionc.
Risk tolerance