Skip to Content
Cybersecurity Risk Management
book

Cybersecurity Risk Management

by Cynthia Brumfield, Brian Haugli
December 2021
Intermediate to advanced
224 pages
4h 41m
English
Wiley
Content preview from Cybersecurity Risk Management

Answers to Chapter Quizzes

CHAPTER 1

  1. 1. When it comes to planning for how you will deal with cybersecurity risks, what are the first steps your organization should take? (Select One)
    1. a. Form a working group across the organization’s various departments (business, technical, legal, sales) to develop a plan. [Answer: Wrong. Although very important to how your organization manages risks, forming a working group of colleagues across your organization should occur later in the planning process after some key building blocks, such as building asset inventories, are completed.]
    2. b. Make a list of the vulnerabilities we know we have and start building our plan to address those vulnerabilities. [Answer: Wrong. Identifying your vulnerabilities is a crucial first step to conducting a risk assessment, but that comes later in the risk planning process.]
    3. c. Conduct an inventory of all our hardware and software assets. [Answer: Correct! As the saying goes, you can’t protect what you don’t know you have. The essential step in developing risk planning and management is to conduct an inventory of all IT- and IP-connected equipment and software.]
  2. 2. Which of the following devices should you include in your asset inventory? (Select all that apply.)
    1. a. Desktops, laptops, and servers. [Answer: Correct. Virtually all desktops, laptops, and servers have IP addresses and therefore are open to attack.]
    2. b. Mobile devices owned by the organization. [Answer: Correct. Virtually all modern mobile phones ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Cybersecurity Guide to Governance, Risk, and Compliance

The Cybersecurity Guide to Governance, Risk, and Compliance

Jason Edwards, Griffin Weaver
NIST Cybersecurity and Risk Management Frameworks

NIST Cybersecurity and Risk Management Frameworks

ACI Learning, Adam Gordon, Zachary Memos
Building a Cyber Risk Management Program

Building a Cyber Risk Management Program

Brian Allen, Brandon Bapst, Terry Allan Hicks

Publisher Resources

ISBN: 9781119816287Purchase Link