Briefly describe the five basic strategies to control risk that result from vulnerabilities.
What will be an ideal response?
?Defense-Applying controls and safeguards that eliminate or reduce the remaining uncontrolled riskTransference-Shifting risks to other areas or to outside entitiesMitigation-Reducing the impact to information assets should an attacker successfully exploit a vulnerabilityAcceptance-Understanding the consequences of choosing to leave a risk uncontrolled and then properly acknowledging the risk that remains without an attempt at controlTermination-Removing or discontinuing the information asset from the organization's operating environment ?
You might also like to view...
Refer to the figure. What does the status for VLAN 10 indicate?
A) All the interfaces assigned to this VLAN are down. B) No interfaces have been assigned to this VLAN. C) The shutdown command has been issued for the VLAN. D) The creation of this VLAN caused an overlap on the switch.
Which of the following is a policy?
A. A document that states that user actions should be monitored B. A document that mandates which user actions should be monitored C. A document that covers exactly how to configure auditing D. A document that covers how to handle security breaches
Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.
A. administrative shares B. simple file sharing C. shared folders D. public folders
The ____ model provides an implementation guide that helps project managers to decide if a particular activity needs to be adopted.
A. AOP B. XP C. waterfall D. CLASP