Free CISMP-V9 Exam Braindumps (page: 6)

Page 5 of 26

You are undertaking a qualitative risk assessment of a likely security threat to an information system. What is the MAIN issue with this type of risk assessment?

  1. These risk assessments are largely subjective and require agreement on rankings beforehand.
  2. Dealing with statistical and other numeric data can often be hard to interpret.
  3. There needs to be a large amount of previous data to "train" a qualitative risk methodology.
  4. It requires the use of complex software tools to undertake this risk assessment.

Answer(s): D



When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?

  1. Risk = Likelihood * Impact.
  2. Risk = Likelihood / Impact.
  3. Risk = Vulnerability / Threat.
  4. Risk = Threat * Likelihood.

Answer(s): C



Which of the following is an accepted strategic option for dealing with risk?

  1. Correction.
  2. Detection.
  3. Forbearance.
  4. Acceptance

Answer(s): A



What Is the KEY purpose of appending security classification labels to information?

  1. To provide guidance and instruction on implementing appropriate security controls to protect the information.
  2. To comply with whatever mandatory security policy framework is in place within the geographical location in question.
  3. To ensure that should the information be lost in transit, it can be returned to the originator using the correct protocols.
  4. To make sure the correct colour-coding system is used when the information is ready for archive.

Answer(s): A






Post your Comments and Discuss BCS CISMP-V9 exam with other Community members:

CISMP-V9 Discussions & Posts