Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Organizations with little experience in risk management will want to look to national and international organizations for guidance in designing and implementing their risk management efforts. There are two dominant organizations that offer guidance in this area: the U.S. National Institute for Standards in Technology (NIST) and the International Standards Organization.
This course examines the risk management frameworks and standards offered by these organization and then discusses other available approaches. The course concludes with a discussion of applications and tools to support the organization’s risk management effort.
Q1. According to our lesson, standards support business _____ and cooperation.
Q2. According to NIST, standards do all of the following except _____.
Q3. Standards could be one of these?
Q1. NIST is an acronym that stands for _____.
Q2. _____ established the agency to remove a major challenge to U.S. industrial competitiveness at the time—a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany, and other economic rivals.
Q3. One of the lesser but still urgent projects for NIST CSD is the ‘Measurements for Information Security’ project.
Q1. The short form of the name used for the International Organizational for Standardization is _____.
Q2. ISO’s first standards focused on _____.
Q3. ISO/IEC 27001, a standard in information security management systems has become one of ISO’s _____ security-related standards.
Q1. According to our lesson, standards support business _____ and cooperation.
Q2. According to NIST, standards do all of the following except _____.
Q3. A de facto standard _____.
Q4. NIST is an acronym that stands for _____.
Q5. _____ established the agency to remove a major challenge to U.S. industrial competitiveness at the time—a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany, and other economic rivals.
Q6. NIST also has a major project called NICE, an acronym for _____.
Q7. The short form of the name used for the International Organizational for Standardization is _____.
Q8. ISO’s first standards focused on _____.
Q9. The International Electrotechnical Commission is the world’s leading organization for the preparation and publication of international standards for all electrical, electronic, and related technologies; And these technologies are collectively as _____.
Q10. ISO/IEC 27001, a standard in information security management systems has become one of ISO’s _____ security-related standards.
Q1. One of the most significant improvements between revision 1 and 2 of the Risk Management Framework (SP 800-37) is the _____.
Q2. The RMF promotes _____.
Q3. The target audience for NIST’s RMF _____.
Q1. There are seven steps in the RMF; six main steps and an appendix for some detailed information.
Q2. The RMF _____ step provides a structured way to determine the criticality of the information being processed, stored, and transmitted by a system.
Q3. The RMF _____ step is to determine that selected security and privacy controls are implemented correctly, operate as intended, produce the desired outcome, and meet organizational or system security and privacy requirements.
Q1. Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of _____ and _____.
Q2. An approach to risk and its factors is _____ when it assess risk based on numbers — with standardized values understood outside the assessment.
Q3. An approach to risk and its factors is _____ when it assess risk using ranges, scales, or representative values.
Q1. According to NIST, risk _____ is the appropriate strategy when the identified risk is within the organizational risk appetite.
Q2. According to NIST, risk _____ is the appropriate response for that portion of risk that cannot be accepted, avoided, shared, or transferred.
Q3. Some risk response measures may be more strategic in nature and reflect solutions that take a much shorter time to implement.
Q1. One of the most significant improvements between revision 1 and 2 of the Risk Management Framework (SP 800-37) is the _____.
Q2. The RMF promotes _____.
Q3. The NIST Risk Management Framework is relatively new and has not been under development for very long.
Q4. The RMF _____ step allows an organization to maintain the authorization of a system over time in a highly dynamic operating environment where systems adapt to changing threats, vulnerabilities, technologies, and mission and business processes.
Q5. The RMF _____ step is to determine that selected security and privacy controls are implemented correctly, operate as intended, produce the desired outcome, and meet organizational or system security and privacy requirements.
Q6. Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of _____ and _____.
Q7. An approach to risk and its factors is _____ when it assess risk based on numbers — with standardized values understood outside the assessment.
Q8. An approach to risk and its factors is _____ when it assess risk using ranges, scales, or representative values.
Q9. According to NIST, risk _____ is the appropriate strategy when the identified risk is within the organizational risk appetite.
Q10. According to NIST, risk _____ is the appropriate response for that portion of risk that cannot be accepted, avoided, shared, or transferred.
Q1. The International Organization for Standardization has two families of publications that include risk management; They are _____ and _____.
Q2. ISO defines _____ as a scheme within the risk management framework specifying the approach, the management components and resources to be applied to the management of risk
Q3. ISO defines _____ as the amount and type of risk that an organization is willing to pursue or retain
Q1. The ISO 31000 series has two key standards that focus on risk management: _____ and _____.
Q2. The ISO 31000 approach to risk management involves three cyclic components: the Principles, the _____ and the Process.
Q3. In the ISO process, the _____ and review activities are where the managers review collected information on the performance and successes of the process team and then use those to improve the process.
Q1. ISO 27005 specifies two types of assets within the standard; _____ and _____.
Q2. The risk management process promoted in ISO 31000 is the basis for the 27005 approach.
Q3. ISO 27005 describes risk assessment as a process that determines the best way treat risks to lower them to acceptable levels.
Q1. The International Organization for Standardization has two families of publications that include risk management; They are _____ and _____.
Q2. ISO defines _____ as a scheme within the risk management framework specifying the approach, the management components and resources to be applied to the management of risk
Q3. ISO defines _____ as a statement of the overall intentions and direction of an organization related to risk management.
Q4. ISO defines _____ as the amount and type of risk that an organization is willing to pursue or retain
Q5. ISO defines _____ as the organization’s or stakeholder’s readiness to bear the risk after risk treatment in order to achieve its objectives.
Q6. The ISO 31000 approach to risk management involves three cyclic components: the Principles, the _____ and the Process.
Q7. An ISO risk management principle of being _____ states that the risk management approach can evolve and react to changes in risk in a timely fashion, as the internal and external environments change
Q8. In the ISO process, the _____ and review activities are where the managers review collected information on the performance and successes of the process team and then use those to improve the process.
Q9. ISO 27005 specifies two types of assets within the standard; _____ and _____.
Q10. ISO 27005 describes risk assessment as a process that determines the best way treat risks to lower them to acceptable levels.
Q1. Known in business circles as an _____ feasibility study, a cost-benefit analysis approach to risk management has the major advantage of being easily understood by traditional managers.
Q2. The _____ is the entire amount of time, effort and money the organization spends to specify, select, acquire, use, support, maintain, improve and eventually terminate the technology or activity.
Q3. A(n) _____ is the probability of a threat occurring within a one year period.
Q1. The _____ approach was designed by Security consultant Jack Jones to help organizations understand, analyze, and measure information risk using a formal yet simplistic framework.
Q2. The _____ approach is a security risk evaluation methodology developed by the Software Engineering Institute of Carnegie Mellon University, that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls.
Q3. The original OCTAVE Method, which forms the basis for the OCTAVE body of knowledge was designed for very small organizations (30 or fewer users).
Q1. Which version of OCTAVE is designed for small and medium businesses to use a pen and paper approach to risk management?
Q2. The initial step in the ALLEGRO process is to _____.
Q3. The final step in the ALLEGRO process is to _____.
Q1. Clearwater Compliance, Information Risk Management Analysis is an example of _____.
Q2. Using CC|IRM, an organization would typically begin by _____ for the information assets to be evaluated in the application.
Q3. The CC|IRM tool expresses the Risk Threshold is scored on a scale of 1 to _____ based on the likelihood times impact ratings.
Q1. Known in business circles as an _____ feasibility study, a cost-benefit analysis approach to risk management has the major advantage of being easily understood by traditional managers.
Q2. The _____ is the entire amount of time, effort and money the organization spends to specify, select, acquire, use, support, maintain, improve and eventually terminate the technology or activity.
Q3. A(n) _____ is the probability of a threat occurring within a one year period.
Q4. The _____ approach was designed by Security consultant Jack Jones to help organizations understand, analyze, and measure information risk using a formal yet simplistic framework.
Q5. The _____ approach is a security risk evaluation methodology developed by the Software Engineering Institute of Carnegie Mellon University, that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls.
Q6. Which version of OCTAVE is designed for small and medium businesses to use a pen and paper approach to risk management?
Q7. The initial step in the ALLEGRO process is to _____.
Q8. The final step in the ALLEGRO process is to _____.
Q9. Clearwater Compliance, Information Risk Management Analysis is an example of _____.
Q10. Using CC|IRM, an organization would typically begin by _____ for the information assets to be evaluated in the application.
Q1. According to our lesson, standards support business _____ and cooperation.
Q2. According to NIST, standards do all of the following except _____.
Q3. Standards could be one of these?
Q4. A de facto standard _____.
Q5. NIST is an acronym that stands for _____.
Q6. _____ established the agency to remove a major challenge to U.S. industrial competitiveness at the time—a second-rate measurement infrastructure that lagged behind the capabilities of the United Kingdom, Germany, and other economic rivals.
Q7. NIST also has a major project called NICE, an acronym for _____.
Q8. The short form of the name used for the International Organizational for Standardization is _____.
Q9. ISO’s first standards focused on _____.
Q10. The International Electrotechnical Commission is the world’s leading organization for the preparation and publication of international standards for all electrical, electronic, and related technologies; And these technologies are collectively as _____.
Q11. ISO/IEC 27001, a standard in information security management systems has become one of ISO’s _____ security-related standards.
Q12. One of the most significant improvements between revision 1 and 2 of the Risk Management Framework (SP 800-37) is the _____.
Q13. The RMF promotes _____.
Q14. The target audience for NIST’s RMF _____.
Q15. The RMF _____ step provides a structured way to determine the criticality of the information being processed, stored, and transmitted by a system.
Q16. The RMF _____ step allows an organization to maintain the authorization of a system over time in a highly dynamic operating environment where systems adapt to changing threats, vulnerabilities, technologies, and mission and business processes.
Q17. The RMF _____ step is to determine that selected security and privacy controls are implemented correctly, operate as intended, produce the desired outcome, and meet organizational or system security and privacy requirements.
Q18. Risk is a measure of the extent to which an entity is threatened by a potential circumstance or event, and is typically a function of _____ and _____.
Q19. An approach to risk and its factors is _____ when it assess risk based on numbers — with standardized values understood outside the assessment.
Q20. An approach to risk and its factors is _____ when it assess risk using ranges, scales, or representative values.
Q21. Risk remediation is the process of identifying, estimating, and prioritizing cybersecurity risks.
Q22. According to NIST, risk _____ is the appropriate strategy when the identified risk is within the organizational risk appetite.
Q23. According to NIST, risk _____ is the appropriate response for that portion of risk that cannot be accepted, avoided, shared, or transferred.
Q24. Once the organization has calculated the risk for each Threat/Vulnerability/Asset triple – regardless of the risk approach used, they need to decide whether the current level of risk is acceptable.
Q25. Some risk response measures may be more strategic in nature and reflect solutions that take a much shorter time to implement.
Q26. The International Organization for Standardization has two families of publications that include risk management; They are _____ and _____.
Q27. ISO defines _____ as a scheme within the risk management framework specifying the approach, the management components and resources to be applied to the management of risk
Q28. ISO defines _____ as a statement of the overall intentions and direction of an organization related to risk management.
Q29. ISO defines _____ as the amount and type of risk that an organization is willing to pursue or retain
Q30. ISO defines _____ as the organization’s or stakeholder’s readiness to bear the risk after risk treatment in order to achieve its objectives.
Q31. The ISO 31000 series has two key standards that focus on risk management: _____ and _____.
Q32. The ISO 31000 approach to risk management involves three cyclic components: the Principles, the _____ and the Process.
Q33. An ISO risk management principle of being _____ states that the risk management approach can evolve and react to changes in risk in a timely fashion, as the internal and external environments change
Q34. In the ISO process, the _____ and review activities are where the managers review collected information on the performance and successes of the process team and then use those to improve the process.
Q35. ISO 27005 specifies two types of assets within the standard; _____ and _____.
Q36. The risk management process promoted in ISO 31000 is the basis for the 27005 approach.
Q37. Known in business circles as an _____ feasibility study, a cost-benefit analysis approach to risk management has the major advantage of being easily understood by traditional managers.
Q38. The heart of the CBA comes down to two areas; _____ and _____.
Q39. The _____ is the entire amount of time, effort and money the organization spends to specify, select, acquire, use, support, maintain, improve and eventually terminate the technology or activity.
Q40. A(n) _____ is the calculated value associated with the most likely loss from a single occurrence of a specific attack (impact).
Q41. A(n) _____ is the probability of a threat occurring within a one year period.
Q42. The _____ approach was designed by Security consultant Jack Jones to help organizations understand, analyze, and measure information risk using a formal yet simplistic framework.
Q43. The _____ approach is a security risk evaluation methodology developed by the Software Engineering Institute of Carnegie Mellon University, that allows organizations to balance the protection of critical information assets against the costs of providing protective and detection controls.
Q44. The OCTAVE methodologies also provide pen and paper forms for working through the risk assessment and risk management process for their respectively-sized organizations.
Q45. The original OCTAVE Method, which forms the basis for the OCTAVE body of knowledge was designed for very small organizations (30 or fewer users).
Q46. Which version of OCTAVE is designed for small and medium businesses to use a pen and paper approach to risk management?
Q47. The initial step in the ALLEGRO process is to _____.
Q48. The final step in the ALLEGRO process is to _____.
Q49. Clearwater Compliance, Information Risk Management Analysis is an example of _____.
Q50. Using CC|IRM, an organization would typically begin by _____ for the information assets to be evaluated in the application.
I hope this Dominant Risk Management Standards and Frameworks Coursera Quiz Answers would be useful for you to learn something new from this problem. If it helped you then don’t forget to bookmark our site for more Coding Solutions.
This Problem is intended for audiences of all experiences who are interested in learning about Data Science in a business context; there are no prerequisites.
Keep Learning!
More Coding Solutions >>