• About Us
  • All Categories
  • Contact
  • Home
  • Our Authors
  • Partner Quizzes (Testing) > Sirius Computer Solutions
  • Global Knowledge Blog Global Knowledge Blog

--

  • Home
  • All Categories
  • Our Authors
  • About Us
  • Global Knowledge Blog
  • Home
  • All Categories
  • Our Authors
  • About Us

CEH v9 Question of the Week: Standard Risk Assessment

By Guest Authors
April 27, 2016

CEH-v9-QOWBlue

What are the required steps in a standard risk assessment?

A. Evaluate what the potential threats are
B. Determine the probability of a disaster or risk related event happening
C. Determine what types of data and systems need to be protected
D. All of the above

Reveal Answer

The correct answer is D.

Risk management steps:

  1. Establishing goals and context (i.e. the risk environment)
  2. Identifying risks
  3. Analysing the identified risks
  4. Assessing or evaluating the risks
  5. Treating or managing the risks
  6. Monitoring and reviewing the risks and the risk environment regularly
  7. Continuously communicating, consulting with stakeholders and reporting

 

 

Related Course
Certified Ethical Hacker v9

In this article
  • CEH
  • Certification
  • Cybersecurity
  • CEH v9
  • certified ethical hacker

Join the Conversation Cancel Reply

Will not be published.


RELATED ARTICLES

  • CEH v9 Question of the Week: iptables

    You have just been hired as an apprentice Security Engineer. Your manager asks you to take a look at iptables on a specific device. You quickly remember that iptables are:
    By Guest Authors March 9, 2016
  • CEH v9 Question of the Week: Full TCP connection

    Which type of scan opens a full TCP connection?
    By Guest Authors July 6, 2016
  • CEH v9 Question of the Week: SQL Injection

    What exploitation tool will help you with SQL Injection?
    By Guest Authors February 24, 2016

CONNECT WITH US

CATEGORIES

Back to top

© 2019 Global Knowledge Training LLC. All Rights Reserved.  Site Admin | Logout