Access over 20 million homework & study documents
search

Quizzz docx

Content type

User Generated

Rating

Showing Page:
1/2
Why is it important to prioritize IT risks, threats, and vulnerabilities?
To have the right data points for a qualitative analysis
To plan on avoiding risk.
To establish the budget to develop the plan outline
Critical items can be addressed first
When developing en executive summary, the primary focus of your message to executive management should
be centered on the possibility of breaking compliance laws and increasing the company's potential liability.
True
False
What would you recommend as a mitigation plan for employees who bring their own CDs and flash drives to
work and plug them into company workstations?
Conduct a cost-benefit analysis, add more storage for users to save their personal photos and music files.
Develop and acceptable use policy, disable USB ports on company workstations, and train employees on
company awareness
Only allow employees to insert CDs and flash drives on company workstations after business hours.
Call the police
What would be a good question to ask executive management when finalizing your IT risk-mitigation plan?
Is emergency budget funding set aside to address the critical "1" risks, threats, and vulnerabilities right
away?
Did you upgrade your Intrusion Detection System?
We will be conducting thorough penetration testing. Can we have the CEO's password to his office
laptop?
Will you be terminating employees who won't sign the security awareness training documents?
Which domain usually contains privacy data in systems, servers, and databases?
LAN-to-WAN domain
User domain
Systems/Application domain
Remote Access domain
Which if the domains can access privacy data and store it on local hard drives and disks?
User domain
Workstation domain
LAN domain
Remote Access domain
Why is the Remote Access domain the most risk-prone of the seven domains?

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/2

Sign up to view the full document!

lock_open Sign Up

Unformatted Attachment Preview

Why is it important to prioritize IT risks, threats, and vulnerabilities? To have the right data points for a qualitative analysis To plan on avoiding risk. To establish the budget to develop the plan outline Critical items can be addressed first When developing en executive summary, the primary focus of your message to executive management should be centered on the possibility of breaking compliance laws and increasing the company's potential liability. True False What would you recommend as a mitigation plan for employees who bring their own CDs and flash drives to work and plug them into c ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great! Studypool always delivers quality work.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4