Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 1 Identifying the opportunities or threats that are present, understand

ID: 3731526 • Letter: Q

Question

Question 1

Identifying the opportunities or threats that are present, understanding the significance of each of them, recognizing what action to take to handle both of them, and monitoring all of the above, are all elements of:

eliminating all risk.

risk assessment.

risk planning.

risk management

Question 2

According to the University of Vermont document you reviewed in the lab, which of the following is at the heart of enterprise risk management (ERM)?

Risk identification

Risk assessment

Risk planning

The risk management process

Question 3

According to the University of Vermont document you reviewed in the lab, which of the following statements is true regarding risk identification?

This stage should be an overview, rather than comprehensive.

Identify negative events but not positive events.

Only consider risks and opportunities that are under your control.

Include the risks associated with not pursuing an opportunity.

Question 4

According to the University of Vermont document you reviewed in the lab, which of the following statements is true regarding the “Steps to Follow” during the risk identification step?

Identify all the risks and opportunities you can that might affect your objectives.

Do not include a name or title for the risks or opportunities you identify.

It is too soon to write any form of risk statement at this stage.

A detailed risk statement should be written that includes all potential impacts or consequences.

According to the University of Vermont document you reviewed in the lab, the purpose of the __________ step is to develop an understanding of the risk or opportunity in order to inform your evaluation and decision of whether a response is required.

risk management

risk identification

risk analysis

risk evaluation

Question 6

According to the Northern Territory Government document you reviewed in the lab, which of the following is the first step in the risk management process?

Assess the Risks

Identify Hazards

Control the Risks

Monitor/Review Control Measures

Question 7

According to the Northern Territory Government document you reviewed in the lab, in which step of the risk management process do you evaluate the likelihood and consequences of the risks?

Assess the Risks

Identify Hazards

Control the Risks

Monitor/Review Control Measures

Question 8

According to the Northern Territory Government document you reviewed in the lab, in which step of the risk management process do you classify the risks?

Assess the Risks

Identify Hazards

Control the Risks

Monitor/Review Control Measures

Question 9

According to the Northern Territory Government document you reviewed in the lab, in which step of the risk management process can you use the hierarchy of risk control as a guide?

Assess the Risks

Identify Hazards

Control the Risks

Monitor/Review Control Measures

Question 10

According to the Northern Territory Government document you reviewed in the lab, which of the following is something that has the potential to cause harm to people, property, or the environment?

Risk

Threat

Hazard

Vulnerability

Question 11

According to the Northern Territory Government document you reviewed in the lab, which of the following is the chance or probability of a hazard causing harm or damage to people, property, or the environment?

Risk

Vulnerability

Likelihood

Threat

Question 12

According to the Northern Territory Government document you reviewed in the lab, what is the exercise called when you are trying to gauge how significant a risk is?

Risk planning

Risk assessment

Risk response

Risk identification

Question 13

According to the Northern Territory Government document you reviewed in the lab, which of the following statements is true regarding the risk management process?

Once a company completes all risk management steps, the task is done.

It is improbable that a company can actually complete the risk management process.

Very few companies use a risk management process.

The aim of implementing controls is to get as many controls in place so the risk is reduced to as low as possible.

Question 14

According to the Northern Territory Government document you reviewed in the lab, which of the following accurately represents the hierarchy of risk control?

Personal protective equipment, engineering, substitution, elimination, administration

Administration, elimination, engineering, personal protective equipment, elimination

Elimination, substitution, engineering, administration, personal protective equipment

Administration, personal protective equipment, substitution, engineering, elimination

Question 15

According to the Northern Territory Government document you reviewed in the lab, what ongoing process should be integrated into all workplace activities?

Risk monitoring

Risk assessment

Risk response

Risk identification

Question 16

In the seven domains of a typical IT infrastructure, the __________ is the most difficult to plan, identify, assess, treat, and monitor because human behavior cannot be easily measured or predicted.

Workstation Domain

User Domain

Local Area Network (LAN) Domain

Remote Access Domain

Question 17

Periodic auditing of human resources (HR) files, monitoring of acceptable use policy (AUP) compliance, implementing Web content filtering, and implementing e-mail filtering would all be risk monitoring techniques for mitigating risk in the:

Workstation Domain.

User Domain.

Local Area Network (LAN) Domain.

Remote Access Domain.

Question 18

Implementing automated server scanning, implementing automated antivirus and malicious software protection, and performing periodic vulnerability assessment scans would all be risk monitoring techniques for mitigating risk in the:

Workstation Domain.

User Domain.

Local Area Network (LAN) Domain.

Remote Access Domain.

Question 19

Implementing Virtual Private Network (VPN) encrypted tunnels or Hypertext Transfer Protocol Secure (HTTPS://) secure Web browser connections, and implementing firewall and VPN monitoring for real-time alarming would be risk monitoring techniques for mitigating risk in the:

Workstation Domain.

System/Application Domain.

Local Area Network (LAN) Domain.

Remote Access Domain.

Question 20

Implementing stringent access controls and authentication systems with real-time monitoring of logons and attempted logons, implementing automatic account lockout after three attempted re-tries, and implementing system logging for access to sensitive systems, applications, and data would all be risk monitoring techniques for mitigating risk in the:

Workstation Domain.

System/Application Domain.

Local Area Network (LAN) Domain.

Remote Access Domain.

eliminating all risk.

risk assessment.

risk planning.

risk management

Explanation / Answer

answer 1. Risk assessment

These are the steps of risk assessment.

Answer 2 Risk management process

Answer 3 include the risk with not persuaing an opportunity

Answer 4 identify all the risk and opportunities you can that might affect your business.

Answer 5 risk analysis

Answer 6 identify hazards

Answer 7 assess the risk

Answer 8.Assess the risk

Answer 9.control the risks

Answer 10.hazard

Answer 11.Risk

Answer 12. Risk assessment

Answer 13. The aim of implementing control is to get as many control in place so the risk is reduced as low as possible

Answer 14.Elimination, substitution, engineering , administration, personal protective equipment.

Answer 15.risk monitoring

Answer 16. User domain

Answer 17 User domain

Answer 18. Local area network domain

Answer 19.Remote access domain

Answer 20. System/ Application domain

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote