New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following forms the basis for the assessment of information security management system (ISMS)?

A.

ISO 9000

B.

ISO 27001

C.

BS7799

D.

ISO 9001

David works as the Network Administrator for Blue Well Inc. One of his tasks is to develop and maintain risk management plan. Which of the following are the objectives of risk management plan?

Each correct answer represents a complete solution. Choose all that apply.

A.

Eliminating risks

B.

Accepting risks cautiously that cannot be eliminated

C.

Developing required risks

D.

Transferring risks by insurance

Sam works as a Project Manager for Blue Well Inc. He is working on a new project. He wants to access high level risks for the project. Which of the following steps should Sam take in order to accomplish the task?

A.

Identifying and analyzing risk events using qualitative and quantitative techniques

B.

Developing risk management plan to identify risks based on documents

C.

Developing project charter to identify risks based on documents

D.

Developing project charter and risk management plan to identify risks based on documents

David has identified a technical risk in his project and has been assigned a contingency for that. Which part of the risk response strategy does planning contingency reserves come under?

A.

Active risk acceptance

B.

Risk avoidance

C.

Risk transfer

D.

Passive risk acceptance

Which of the following pillars of Basel II is concerned with maintenance of regulatory capital intended for three major components of risk that a bank faces, which are credit risk, operational risk, and market risk?

A.

Pillar 4

B.

Pillar 2

C.

Pillar 3

D.

Pillar 1

Disaster recovery plan consists of various tiers for identifying the methods of recovering mission-critical computer systems that are necessary to support business continuity. All these tiers provide a simple method to define current service levels and associated risks. Choose and re-order the tiers of disaster recovery plan.

A.

Which of the following statements is true about annualized loss expectancy?

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

D.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following is an intangible asset?

A.

Personal data

B.

Electricity

C.

Reputation of the company

D.

Equipment

Which of the following is a structured approach to transitioning individuals, teams, and organizations from a current state to a desired future state?

A.

Supply chain management

B.

Inventory management

C.

Information security management

D.

Change management

You work as an Information Security Manager for uCertify Inc. You need to make the documentation on change management. What are the advantages of using change management?

Each correct answer represents a complete solution. Choose all that apply.

A.

Improved estimates of the costs of proposed changes

B.

Reduced adverse impact of changes on the quality of IT services

C.

Maintenance of user passwords in a secure location

D.

Encryption of personal data when changing locations