O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter review

Test your knowledge of the information in this chapter by answering these questions. The answers to these questions, and the explanations of why each answer choice is correct or incorrect, are located in the Answers section at the end of this chapter.

  1. Which of the following accurately describes the risk management techniques?

    1. Risk acceptance, risk transference, risk avoidance, risk mitigation

    2. Risk acceptance, risk containment, risk avoidance, risk migration

    3. Risk acceptance, risk mitigation, risk containment, risk quantification

    4. Risk avoidance, risk migration, risk containment, risk quantification

  2. Which of the following identifies a model that specifically targets security and not governance of an entire enterprise? (Choose all that apply.) ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required