1) Which of the following terms relates closely to the concept of residual risk? a) Risk deterrence b) Risk transference c) Risk acceptance d) Risk avoidance 2) Disabling certain system functions or shutting down the system when risks are identified is an example of: a) Risk acceptance b) Risk avoidance c) Risk transference d) Risk deterrence 3) Contracting out a specialized technical component when the company's employees lack the necessary skills is an example of: a) Risk deterrence b) Risk avoidance c) Risk acceptance d) Risk transference 4) Cybersecurity insurance is an example of which risk management strategy? a) Risk avoidance b) Risk deterrence c) Risk transference d) Risk acceptance 5) Which of the following is an example of a risk mitigation strategy? a) Implementation of security controls b) System shutdown c) IT personnel outsourcing d) Cybersecurity insurance 6) Which of the following answers refers to a document containing detailed information on potential cybersecurity risks? a) Risk register b) Risk heat map c) Risk matrix d) Risk repository 7) This term is used for estimating the likelihood of occurrence of a future threat. a) ALE b) SLA c) ARO d) SLE 8) Which term describes the predicted loss of value to an asset based on a single security incident? a) SLE b) ARO c) ALE d) SLA 9) Which of the acronyms listed below refers to a risk assessment formula defining probable financial loss due to risk over a one-year period? a) ARO b) SLE c) ALE d) SLA

CompTIA Security+ Risk Managment

looja

Edetabel

Visuaalne stiil

Valikud

Vaheta malli

Kas taastada automaatselt salvestatud ?