simulating attack from a malicious source could be
establishing the context and providing common pers
Written for
FEDVTE Foundations of Incident Management
FEDVTE Foundations of Incident Management
1
review
By: nicholleam • 3 months ago
Not the same questions or answers on test. Waste of money.
By: Purity96 • 3 months ago
Thanks for the review
Seller
Follow
Purity96
Reviews received
Content preview
FedVTE Fundamentals of Cyber Risk
Management
Which of the following families of controls belong to the technical class of controls? -
ANSIdentification and Authentication
Which of the following is a management strategy for addressing risk? - ANSAccept
Cyber risk management solutions are typically done through which categories of security
controls? - ANSTechnical, Physical, Administrative
There are agreements organizations may enter into where one party is willing to accept an
amount of risk from another. That transfer is a strategy for managing risk. - ANSTRUE
Which security principle is concerned with the unauthorized modification of important or
sensitive information? - ANSIntegrity
Simulating attack from a malicious source could be part of penetration testing. - ANSTRUE
Which of the following is an example of a physical control? - ANSSecurity guard
Incident response planning phase 1 (preparation) calls for: - ANSNot B or C
The inputs (threat source motivation, threat capacity, nature of vulnerability, and current
controls) will aid in generating output used in which step of the NIST SP risk assessment
guidance? - ANSLikelihood Determination
The threat-source is motivated and capable, but controls are in place that may impede
successful exercise of the vulnerability. Which likelihood rating does this describe? -
ANSMedium
Which technical control places publicly accessible servers in a special network separated
from the internal network? - ANSDe-militarized Zone
Establishing the context and providing common perspective on how organizations manage
risk is the goal of: - ANSRisk Framing
In the event of a major disaster, which of the following is a fully equipped alternate site,
requiring the shortest setup time to resume full business operations? - ANSHot
Methods of response for managing risks are: - ANSAccept, Transfer, Mitigate, Avoid
All of the following business assets have threats that would be included for consideration as
a part of threat analysis EXCEPT: - ANSAll of the above would be included
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Purity96. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.55. You're not tied to anything after your purchase.