Which of the following describes a qualitative risk assessment approach?
Answer(s): C
You are undertaking a qualitative risk assessment of a likely security threat to an information system. What is the MAIN issue with this type of risk assessment?
Answer(s): D
When calculating the risk associated with a vulnerability being exploited, how is this risk calculated?
Which of the following is an accepted strategic option for dealing with risk?
Answer(s): A
What Is the KEY purpose of appending security classification labels to information?
Share your comments for BCS CISMP-V9 exam with other users:
the aaa triad in information security is authentication, accounting and authorisation so the answer should be d 1, 3 and 5.