Page 204 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 204
Written Lab
1. Name six different administrative controls used to secure
personnel.
2. What are the basic formulas used in quantitative risk assessment?
3. Describe the process or technique used to reach an anonymous
consensus during a qualitative risk assessment.
4. Discuss the need to perform a balanced risk assessment. What are
the techniques that can be used and why is this necessary?

