The other three choices are incorrect because they are elements of risk mitigation. Risk mitigation involves three steps: determining those areas where risk is unacceptable; selecting effective safeguards and evaluating the controls; and determining if the residual risk is acceptable.
137. The value of information is measured by its:
a. Negative value
b. Value to the owner
c. Value to others
d. Value of immediate access
138. Risk is the possibility of something adverse happening to an organization. Which of the following steps is the most difficult one to accomplish in a risk management process?
a. Risk profile
b. Risk assessment
c. Risk mitigation
d. Risk maintenance
Risk assessment, the process of analyzing and interpreting risk, is composed of three basic activities: (i) determining the assessment’s scope and methodology, (ii) collecting and synthesizing data, and (iii) interpreting the risk. A risk assessment can focus on many different areas of controls (including management, technical, and operational). These controls can designed into a new application and incorporated into all areas of an organization’s functions and operations (including telecommunication data centers, and business units). Because of the nature of the scope and the extent of risk assessment, it is the most difficult one to accomplish.
Risk profile and risk maintenance are not the most difficult to accomplish because they are the by-products of the risk assessment process. Risk profile for a computer system or facility involves identifying threats and developing controls and policies in order to manage risks.
Risk mitigation involves the selection and implementation of cost-effective security controls to reduce risk to a level acceptable to management, within applicable constraints. Again, risk mitigation comes after the completion of the risk assessment process.
139. The focus of risk management is that risk must be:
a. Eliminated
b. Prevented
c. Avoided
d. Managed
140. What is a risk event that is an identifiable uncertainty called?
a. Known-unknown
b. Unknown-unknown
c. Known-known
d. Unknown-known
141. Which of the following is an optional requirement for organizations?
a. Policies
b. Procedures
c. Standards
d. Guidelines
142. Which of the following is the
a. Unclassified
b. Unclassified but sensitive
c. Secret
d. Confidential
143. Which of the following is
a. Customer lists
b. Supplier names
c. Technical specifications
d. Employee names