CYB 410 4-2 Reading Quiz

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Management

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by BarristerExploration6300

Report
Attempt Score 20 / 20 - A Overall Grade (Highest Attempt) 20 / 20 - A stion 1 2 / 2 point What are the three steps that should be performed in a business impact analysis (BIA)? Question options: Identify the key IT resources, identify disruption impacts, develop recovery priorities Process disruption measures, develop response strategies, identify key stakeholders Identify system resources, develop processes and procedures, identify management Plan for disaster recovery, plan business continuity, perform quantitative risk analysis on 2 / 2 poin From a business impact analysis (BIA), the organization can identify the individual consequences of which of the following? Question options: Risk factors and compromise Disaster recovery planning A disruption to each system Business continuity planning on 2 / 2 poin After conducting a business impact analysis (BIA), an organization will have vital information concerning what? Question options: Its systems and their recovery Loss mitigation strategies Staff’s ability to respond Preventative measures on 2 / 2
poin The maximum allowable outage time is the period of unavailability of a resource during which the business will not experience which of the following? Question options: Identify key indicators of compromise Experience allowable uptime Feel major distractions Feel major impacts on 2 / 2 poin The main purpose of a business impact analysis (BIA) is to correlate different systems with which of the following? Question options: The disaster recovery plan The type of data within the system The system administrators The critical services that they offer on 2 / 2 poin The best outage time estimates should be obtained by balancing the cost of a disruption and the cost of which of the following? Question options: Incident response support Recovery of an IT resource Restoration of backup systems Legal fees and expenses on 2 / 2
poin Which of the following is a proven strategy for effectively getting cybersecurity points across to management? Question options: Enlist the creative department to build storyboards of situations. Create a story inventory to help illustrate relevant situations. Ad lib current events with high-level details. Contract an outside firm to create a scenario where corporate assets are compromised. on 2 / 2 poin What is a technique to involve business leaders in scenarios to create buy-in for cybersecurity? Question options: Wargaming Avoidance PenTesting Cyber Warfare on 2 / 2 poin Which of the following is the new norm board members and leadership should understand? Question options: Risk is compartmentalized and does not affect the entire business. The cyber everywhere mentality is the new norm. It is unlikely that a threat will be successful in this company. Pushing everything to the cloud will make the company safe. on 2 / 2 poin
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Which of the following is the main purpose of creating a dialogue to engage leadership? Question options: Sway decisions Reduce competition Request larger budgets Build Trust