Answer the following statement(s) true (T) or false (F)

1. Based on the FAIR framework, the vulnerability level is estimated based on the loss event frequency and threat capability.
2. Most standard frameworks share the same 6 common activities.
3. A system that is remotely accessible via VPN is more likely to be compromised by a threat than a system that is Internet accessible.
4. An information security officer usually sets the strategy and approach and review the findings at the end of the project.
5. The criticality and importance of a business may increase the integrity and availability impacts of a threat.


1. False
2. True
3. False
4. False
5. True

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Customization is accomplished by implementing special methods. 2) Python allows the programmer to create new operators to overload. 3) Overloading a mathematical operator implicitly overloads its augmented assignment counterpart. 4) User-defined objects can use Python’s implicit operator overloading to get the expected results. 5) A class may overload the operation of the = assignment statement.

Computer Science & Information Technology

What is perimeter defense?

A. divide two separate applications between networks to help manage security B. divide two separate perimeters between networks to help manage security C. divide two separate firewall between networks to help manage security D. divide two separate digital certificates between networks to help manage security

Computer Science & Information Technology

The _____ is the heart of the operating system and controls its most critical processes.

A. user interface B. register C. kernel D. cache

Computer Science & Information Technology

The following pseudocode statements describe the _____ list operation.set pWalker to list headloop (more nodes)   process (pWalker data)   set pWalker to next linkend loop

A. search B. traverse C. list count D. destroy

Computer Science & Information Technology