Free 212-89 Exam Braindumps (page: 19)

Page 18 of 41

Overall Likelihood rating of a Threat to Exploit a Vulnerability is driven by :

  1. Threat-source motivation and capability
  2. Nature of the vulnerability
  3. Existence and effectiveness of the current controls
  4. All the above

Answer(s): D



Absorbing minor risks while preparing to respond to major ones is called:

  1. Risk Mitigation
  2. Risk Transfer
  3. Risk Assumption
  4. Risk Avoidance

Answer(s): C



The left over risk after implementing a control is called:

  1. Residual risk
  2. Unaccepted risk
  3. Low risk
  4. Critical risk

Answer(s): A



Adam calculated the total cost of a control to protect 10,000 $ worth of data as 20,000 $. What do you advise Adam to do?

  1. Apply the control
  2. Not to apply the control
  3. Use qualitative risk assessment
  4. Use semi-qualitative risk assessment instead

Answer(s): B






Post your Comments and Discuss EC-Council 212-89 exam with other Community members:

212-89 Discussions & Posts