Question 1 Identifying the opportunities or threats that are present, understand
ID: 3731526 • Letter: Q
Question
Question 1
Identifying the opportunities or threats that are present, understanding the significance of each of them, recognizing what action to take to handle both of them, and monitoring all of the above, are all elements of:
eliminating all risk.
risk assessment.
risk planning.
risk management
Question 2
According to the University of Vermont document you reviewed in the lab, which of the following is at the heart of enterprise risk management (ERM)?
Risk identification
Risk assessment
Risk planning
The risk management process
Question 3
According to the University of Vermont document you reviewed in the lab, which of the following statements is true regarding risk identification?
This stage should be an overview, rather than comprehensive.
Identify negative events but not positive events.
Only consider risks and opportunities that are under your control.
Include the risks associated with not pursuing an opportunity.
Question 4
According to the University of Vermont document you reviewed in the lab, which of the following statements is true regarding the “Steps to Follow” during the risk identification step?
Identify all the risks and opportunities you can that might affect your objectives.
Do not include a name or title for the risks or opportunities you identify.
It is too soon to write any form of risk statement at this stage.
A detailed risk statement should be written that includes all potential impacts or consequences.
According to the University of Vermont document you reviewed in the lab, the purpose of the __________ step is to develop an understanding of the risk or opportunity in order to inform your evaluation and decision of whether a response is required.
risk management
risk identification
risk analysis
risk evaluation
Question 6
According to the Northern Territory Government document you reviewed in the lab, which of the following is the first step in the risk management process?
Assess the Risks
Identify Hazards
Control the Risks
Monitor/Review Control Measures
Question 7
According to the Northern Territory Government document you reviewed in the lab, in which step of the risk management process do you evaluate the likelihood and consequences of the risks?
Assess the Risks
Identify Hazards
Control the Risks
Monitor/Review Control Measures
Question 8
According to the Northern Territory Government document you reviewed in the lab, in which step of the risk management process do you classify the risks?
Assess the Risks
Identify Hazards
Control the Risks
Monitor/Review Control Measures
Question 9
According to the Northern Territory Government document you reviewed in the lab, in which step of the risk management process can you use the hierarchy of risk control as a guide?
Assess the Risks
Identify Hazards
Control the Risks
Monitor/Review Control Measures
Question 10
According to the Northern Territory Government document you reviewed in the lab, which of the following is something that has the potential to cause harm to people, property, or the environment?
Risk
Threat
Hazard
Vulnerability
Question 11
According to the Northern Territory Government document you reviewed in the lab, which of the following is the chance or probability of a hazard causing harm or damage to people, property, or the environment?
Risk
Vulnerability
Likelihood
Threat
Question 12
According to the Northern Territory Government document you reviewed in the lab, what is the exercise called when you are trying to gauge how significant a risk is?
Risk planning
Risk assessment
Risk response
Risk identification
Question 13
According to the Northern Territory Government document you reviewed in the lab, which of the following statements is true regarding the risk management process?
Once a company completes all risk management steps, the task is done.
It is improbable that a company can actually complete the risk management process.
Very few companies use a risk management process.
The aim of implementing controls is to get as many controls in place so the risk is reduced to as low as possible.
Question 14
According to the Northern Territory Government document you reviewed in the lab, which of the following accurately represents the hierarchy of risk control?
Personal protective equipment, engineering, substitution, elimination, administration
Administration, elimination, engineering, personal protective equipment, elimination
Elimination, substitution, engineering, administration, personal protective equipment
Administration, personal protective equipment, substitution, engineering, elimination
Question 15
According to the Northern Territory Government document you reviewed in the lab, what ongoing process should be integrated into all workplace activities?
Risk monitoring
Risk assessment
Risk response
Risk identification
Question 16
In the seven domains of a typical IT infrastructure, the __________ is the most difficult to plan, identify, assess, treat, and monitor because human behavior cannot be easily measured or predicted.
Workstation Domain
User Domain
Local Area Network (LAN) Domain
Remote Access Domain
Question 17
Periodic auditing of human resources (HR) files, monitoring of acceptable use policy (AUP) compliance, implementing Web content filtering, and implementing e-mail filtering would all be risk monitoring techniques for mitigating risk in the:
Workstation Domain.
User Domain.
Local Area Network (LAN) Domain.
Remote Access Domain.
Question 18
Implementing automated server scanning, implementing automated antivirus and malicious software protection, and performing periodic vulnerability assessment scans would all be risk monitoring techniques for mitigating risk in the:
Workstation Domain.
User Domain.
Local Area Network (LAN) Domain.
Remote Access Domain.
Question 19
Implementing Virtual Private Network (VPN) encrypted tunnels or Hypertext Transfer Protocol Secure (HTTPS://) secure Web browser connections, and implementing firewall and VPN monitoring for real-time alarming would be risk monitoring techniques for mitigating risk in the:
Workstation Domain.
System/Application Domain.
Local Area Network (LAN) Domain.
Remote Access Domain.
Question 20
Implementing stringent access controls and authentication systems with real-time monitoring of logons and attempted logons, implementing automatic account lockout after three attempted re-tries, and implementing system logging for access to sensitive systems, applications, and data would all be risk monitoring techniques for mitigating risk in the:
Workstation Domain.
System/Application Domain.
Local Area Network (LAN) Domain.
Remote Access Domain.
eliminating all risk.
risk assessment.
risk planning.
risk management
Explanation / Answer
answer 1. Risk assessment
These are the steps of risk assessment.
Answer 2 Risk management process
Answer 3 include the risk with not persuaing an opportunity
Answer 4 identify all the risk and opportunities you can that might affect your business.
Answer 5 risk analysis
Answer 6 identify hazards
Answer 7 assess the risk
Answer 8.Assess the risk
Answer 9.control the risks
Answer 10.hazard
Answer 11.Risk
Answer 12. Risk assessment
Answer 13. The aim of implementing control is to get as many control in place so the risk is reduced as low as possible
Answer 14.Elimination, substitution, engineering , administration, personal protective equipment.
Answer 15.risk monitoring
Answer 16. User domain
Answer 17 User domain
Answer 18. Local area network domain
Answer 19.Remote access domain
Answer 20. System/ Application domain
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.