“Accept the risk” is satisfactory when the exposure is small and the protection cost is high. “Assign the risk” is used when it costs less to assign the risk to someone else than to directly protect against it. “Avoid the risk” means placing necessary measures so that a security incident will not occur at all or so that a security event becomes less likely or costly.
128. What is an attacker repeatedly using multiple different attack vectors repeatedly to generate opportunities called?
a. Adverse action
b. Advanced threat
c. Threat agent
d. Threat source
Adverse actions are actions performed by a threat agent on an asset. These actions influence one or more properties of an asset from which that asset derives its value. A threat consists of a threat agent, a targeted asset, and an adverse action of that threat agent on that asset. Threat agents are entities that can adversely act on assets. Examples of threat agents include hackers, users, computer processes, software development staff, and accidental/intentional errors. Threat agents and threat sources are the same in that their intents and methods are targeted at the intentional exploitation of vulnerability or a situation and the methods that may accidentally trigger vulnerability.
129. What does a “deviation from an organization-wide approved security policy” mean?
a. Risk acceptance
b. Risk assignment
c. Risk reduction
d. Risk containment
130. When performing risk analysis, annual loss exposure is calculated as which of the following?
a. Impact multiplied by frequency of occurrence
b. Impact minus frequency of occurrence
c. Impact plus frequency of occurrence
d. Impact divided by frequency of occurrence
131. A risk analysis provides management of all the following
a. Accepting the occurrence of a harmful event
b. Reducing the impact of occurrence of a harmful event
c. Ranking critical applications
d. Recognizing that a potential for loss exists
The risk analysis should help managers compare the cost of the probable consequences to the cost of effective safeguards. Ranking critical applications comes after the risk analysis is completed. Critical applications are those without which the organization could not function. Proper attention should be given to ensure that critical applications and software are sufficiently protected against loss.
132. Which of the following methods for handling risk involves a third party?
a. Accepting risk
b. Eliminating risk
c. Reducing risk
d. Transferring risk