MANAGEMENT

BUISENESS MANAGEMENT

RISK MANAGEMENT

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. What type of risk response behavior is she recommending?
A
Accept
B
Transfer
C
Reduce
D
Reject
Explanation: 

Detailed explanation-1: -After conducting a qualitative risk assessment of her organization, Sally recommends purchasing cybersecurity breach insurance. What type of risk response behavior is she recommending? B. Purchasing insurance is a means of transferring risk.

Detailed explanation-2: -The Delphi technique is an anonymous feedback-and-response process used to enable a group to reach an anonymous consensus. Its primary purpose is to elicit honest and uninfluenced responses from all participants.

Detailed explanation-3: -He is coordinating the meeting with Human Resources and wants to protect the company against damage. Which one of the following steps is most important to coordinate in time with the termination meeting? Account deactivation.

Detailed explanation-4: -Awareness establishes a minimum standard of information security understanding. It is designed to accommodate all personal of the organization staff regardless of their assigned tasks.

Detailed explanation-5: -If Kara’s primary concern is preventing administrative connections to the server, which port should she block? A. Port 22 is used by the Secure Shell (SSH) protocol for administrative connections. If Kara wants to restrict administrative connections, she should block access on this port.

There is 1 question to complete.