Appendix A. Answer Key

CHAPTER 1 Risk Management Fundamentals

  1. D

  2. B

  3. B

  4. A and C

  5. Intangible value

  6. B

  7. B

  8. D

  9. CVE

  10. A

  11. D

  12. Transfer

  13. A, B, and C

  14. D

  15. C

CHAPTER 2 Managing Risk: Threats, Vulnerabilities, and Exploits

  1. D

  2. A

  3. B

  4. C

  5. D

  6. C

  7. B

  8. A

  9. A

  10. E

  11. A

  12. B

  13. C

  14. The MITRE Corporation

  15. A

CHAPTER 3 Maintaining Compliance

  1. C

  2. D

  3. A

  4. C

  5. B

  6. A

  7. D

  8. A

  9. A

  10. A

  11. B

  12. C

  13. A

  14. 5

  15. D

CHAPTER 4 Developing a Risk Management Plan

  1. E

  2. E

  3. D

  4. C

  5. B

  6. A

  7. A and B

  8. B

  9. D

  10. A

  11. C

  12. A

  13. C

  14. D

  15. C

CHAPTER 5 Defining Risk Assessment Approaches

  1. E

  2. Assessment

  3. B

  4. Quantitative risk assessment

  5. C

  6. A

  7. B

  8. Qualitative

  9. Quantitative

  10. B

  11. Quantitative

  12. Qualitative

  13. D

  14. A and B

  15. E

CHAPTER 6 Performing a Risk Assessment

  1. A

  2. E

  3. E

  4. B

  5. D

  6. A

  7. Administrative

  8. Technical

  9. Physical

  10. C

  11. A

  12. B

  13. B

  14. C

  15. B

CHAPTER 7 Identifying Assets and Activities to Be Protected

  1. A

  2. B

  3. E

  4. E

  5. Job

  6. E

  7. C

  8. A

  9. D

  10. Mission-critical

  11. D

  12. A

  13. B

  14. C

  15. B

CHAPTER 8 Identifying and Analyzing Threats, Vulnerabilities, and Exploits

  1. Natural

  2. A

  3. C

  4. A, B, C, and D

  5. D

  6. Vulnerability ...

Get Managing Risk in Information Systems now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.