Page 204 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 204

Written Lab


                1.  Name six different administrative controls used to secure
                    personnel.


                2.  What are the basic formulas used in quantitative risk assessment?
                3.  Describe the process or technique used to reach an anonymous

                    consensus during a qualitative risk assessment.

                4.  Discuss the need to perform a balanced risk assessment. What are
                    the techniques that can be used and why is this necessary?
   199   200   201   202   203   204   205   206   207   208   209