What consists of the identification of risks or threats, the implementation of security measures,
and the monitoring of those measures for effectiveness?
a. Risk management
b. Risk assessment
c. Security
d. None of the above

1 Answer

Answer :

a. Risk management

Related questions

Description : What is the process of evaluating IT assets, their importance to the organization, and their susceptibility to threats, to measure the risk exposure of these assets? a. Risk management b. Risk assessment c. Security d. None of the above

Last Answer : b. Risk assessment

Description : Software safety is a ................... activity that focuses on the identification and assessment of potential hazards that may affect software negatively and cause an entire ... monitoring and management (B) Software quality assurance (C) Software cost estimation (D) Defect removal efficiency

Last Answer : (B) Software quality assurance

Description : In simple terms, what does risk assessment ask? a. What can go wrong? b. How likely is it to go wrong? c. What are the possible consequences if it does go wrong? d. All of the above

Last Answer : d. All of the above

Description : The main aim of a project risk management process should be to: a. identify project risks and then manage them appropriately. b. identify all project risks and transfer them immediately. c ... are threats or opportunities on a project. d. satisfy the organization's project management process.

Last Answer : a. identify project risks and then manage them appropriately.

Description : The main aim of a project risk management process should be to:  a. identifies project risks and then manage them appropriately.  b. identify all project risks and transfer them immediately.  ... are threats or opportunities on a project.  d. satisfy the organisation's project management process.

Last Answer : a. identifies project risks and then manage them appropriately.

Description : Which one is not a server level threat? a. Malicious code b. CGI threats c. Database threats d. Buffer overflows

Last Answer : a. Malicious code

Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above

Last Answer : d. All of the above

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : Asking the patient questions to determine if the person understands the health teaching provided would be included during which step of the nursing process? a) Evaluation Evaluation includes observing ... ) Implementation Implementation is the step during which the teaching plan is put into action.

Last Answer : a) Evaluation Evaluation includes observing the person, asking questions, and comparing the patient’s behavioral responses with the expected outcomes.

Description : During which step of the nursing process does the nurse analyze data related to the patient's health status? a) Assessment Analysis of data is included as part of the assessment. b) ... patient's responses to the nursing interventions and the extent to which the outcomes have been achieved.

Last Answer : a) Assessment Analysis of data is included as part of the assessment.

Description : The main outcome of risk identification, in a risk management process, is to: a. identify and determine the relative importance of the project risks. b. identify and describe all risks that ... responses to the project risks. d. identify and describe risks that have occurred on previous projects.

Last Answer : b. identify and describe all risks that might occur on the project.

Description : Which of the following statements about risk is true? Select one: a. Project risk focuses on identifying, assessing, and eliminating the risks on the project. b. Risk management is all ... are no risk-free projects. e. Risk management involves identification, evaluation, and elevation of risk

Last Answer : d. There are no risk-free projects.

Description : The process of assessing the probability and consequences of identified risks to the project objectives, assigning a risk score to each risk, and creating a list of prioritized risks describes ... Risk Analysis B. Risk Identification C. Qualitative Risk Analysis D. Risk Management Planning

Last Answer : C. Qualitative Risk Analysis

Description : The main outcome of risk identification, in a risk management process, is to:  a. identify and determine the relative importance of the project risks.  b. identify and describe all risks that ... to the project risks.  d. identify and describe risks that have occurred on previous projects.

Last Answer : b. identify and describe all risks that might occur on the project.

Description : Which of the following applies to the implementation of an idea? a. Copyright b. Intellectual property c. Patent d. Denial‐of‐service attack

Last Answer : c. Patent

Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : d. Biometrics

Description : All of the following statements are true regarding risk events except which one?  Choose the least correct answer. A. Project risks are uncertain events.  B. If risks occur, they can ... that have more perceived rewards to the organization than the consequences of  the risk should be accepted.

Last Answer : C. Unknown risks are threats to the project objectives, and nothing can be done to  plan for them.

Description : Which of the following is not a part of energy audit as per the Energy Conservation Act, 2001? a) monitoring and analysis of energy use b) verification of energy use c) submission of technical report with recommendations d) ensuring implementation of recommended measures followed by review

Last Answer : d) ensuring implementation of recommended measures followed by review

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : Cyber slacking consists of what activities? a. Visiting “inappropriate” web sites b. Visiting news sites c. Chatting online with others about non‐work topics d. All of the above

Last Answer : d. All of the above

Description : All of the following are true regarding the Qualitative Risk Analysis process except  which one?  A. Probability and impact and expert interview are used to help correct biases that occur  in the data ... of this process used to determine  which risks need near-term response plans.

Last Answer : C. Qualitative Risk Analysis is an easy method of determining risk probability and  impact that usually takes a good deal of time to perform.

Description : Which one of the following statements about the project risk register is false? a. It facilitates the review and monitoring of risks. b. It facilitates the risk appetite. c. It facilitates the recording of risk responses. d. It facilitates the recording of risks.

Last Answer : b. It facilitates the risk appetite.

Description : Which of the following is not the part of Risk Control  A. Execution of the risk response strategy  B. Monitoring of triggering events  C. Initiating contingency plans  D. Not watching for new risks

Last Answer : D. Not watching for new risks

Description : Which one of the following statements about the project risk register is false?  a. It facilitates the review and monitoring of risks.  b. It facilitates the risk appetite.  c. It facilitates the recording of risk responses.  d. It facilitates the recording of risks

Last Answer : b. It facilitates the risk appetite

Description : Monte Carlo analysis can help predict the impact of risks on project deliverables.  This is an element of one of the tools and techniques of which of the following processes? A. Risk Response Planning B. Quantitative Risk Analysis C. Risk Identification D. Qualitative Risk Analysis

Last Answer : B. Quantitative Risk Analysis

Description : During E‐commerce transaction we should ensure‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Integrity b. Security c. Confidentiality d. All the above

Last Answer : d. All the above

Description : Which one is a communication channel security protocol? a. SSL b. S‐HTTP c. SET d. ALL OF THE ABOVE

Last Answer : d. ALL OF THE ABOVE

Description : Which one is not used as a security mechanism? a. Encryption b. Cryptography c. Wallets d. Digital signature

Last Answer : c. Wallets

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : b. Public key encryption

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption

Last Answer : a. digital wallet

Description : Which of the following is not related to security mechanism a. encryption b. decryption c. e‐cash d. all the above

Last Answer : c. e‐cash

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : The tool used for performance assessment and logical evaluation of avenues for improvement in Energy management and audit is a) Fuel substitution c) Energy pricing b) Monitoring and verification d) Bench marking

Last Answer : Bench marking

Description : The tool used for performance assessment and logical evaluation of avenues for improvement in Energy management and audit is a) Fuel substitution b) Monitoring and verification c) Energy pricing d) Bench marking 23. Infrared thermometer is used

Last Answer : Bench marking

Description : is the identification of energy consumption level, which is desirable as a management objective to work towards energy conservation a) Recording b) Targeting c) Analysing d) Monitoring

Last Answer : Targeting

Description : What describes a process of continuously measuring results and comparing those results to optimal performance so that actual performance may be improved? a. Performance b. Capacity planning c. Benchmarking d. Data cleansing

Last Answer : c. Benchmarking

Description : Which is not a function of ERP? a. Human resource management b. financial c. warehousing d. None of the above

Last Answer : d. None of the above

Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards

Last Answer : d. Smart cards

Description : Project risk management is best described as: a. managing responses to threats. b. identifying and acknowledging threats and opportunities. c. planning responses to threats. d. minimising threats and maximising opportunities.

Last Answer : d. minimising threats and maximising opportunities.

Description : Project risk management is best described as:  a. managing responses to threats.  b. identifying and acknowledging threats and opportunities.  c. planning responses to threats.  d. minimising threats and maximising opportunities.

Last Answer : d. minimising threats and maximising opportunities.

Description : One of the key objectives for Security initiatives in the cloud should be subject to measurements that gauge effectiveness in mitigating risk to the enterprise a) Effective Use of Resources b) Sustained Performance c) Risk Mitigation d) Strategic Alignment

Last Answer : Risk Mitigation

Description : Developing a vision and mission, identifying an organization's external opportunities and threats, and determining internal strengths and weaknesses are all __________ activities. a. strategy-formulation b. strategy-implementation c. long-range planning d. short-range planning

Last Answer : strategy-formulation

Description : Developing a Vision and Mission, identifying an Organization’s external opportunities & threats and determining internal strengths & weaknesses are all -------------- activities : A. Strategy Formulation B. Strategy Implementation C. Long-range Planning D. Short-range Planning

Last Answer : Strategy Formulation

Description : Earned value management integrates scope, cost, and schedule measures to:  A. assess project performance and progress.  B. develop a preliminary budget. C. assess communication effectiveness among project team members. D. assess whether all requirements were met.

Last Answer : A. assess project performance and progress.

Description : All of the following statements are true regarding risks except for which one? Choose the least correct answer.  A. Risks might be threats to the objectives of the project.  B. Risks are ... Risks might be opportunities to the objectives of the project.  D. Risks have causes and consequences.

Last Answer : B. Risks are certain events that may be threats or opportunities to the objectives of  the project